In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes.
This report summarises tests conducted within ind.
Inferred improvements during Aug 2020: none inferred
Source Address Validation issues inferred during Aug 2020: ASN Name First-Spoofed Last-Spoofed 55836 RELIANCEJIO-IN 2017-03-03 2020-08-31 132976 KINGSBROADBAND 2018-09-17 2020-08-25 24186 RAILTEL 2018-12-08 2020-08-22 132335 NETWORK-LEAPSWITCH-IN 2020-08-24 2020-08-24 134026 ULTRANET 2020-08-27 2020-08-28 45184 DEN-ISP-AS-IN-AP 2020-08-28 2020-08-28 135180 STARLING 2020-08-31 2020-08-31
Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=ind&no_block=...
Please send any feedback or suggestions to firstname.lastname@example.org
CAIDA Spoofer Project