BGPMON Alert Questions

Peter Tavenier petertavenier at gmail.com
Wed Apr 2 21:23:18 UTC 2014


Same here. AS path is 18356 38794 4651 4761. 
Did anybody had any contact with AS 4761? 

Regards,
Peter

> Op 2 apr. 2014 om 22:57 heeft Curtis Doty <Curtis at GreenKey.net> het volgende geschreven:
> 
>> On Wed, Apr 2, 2014 at 1:24 PM, Blake Dunlap <ikiris at gmail.com> wrote:
>> 
>> Is this malicious or did someone redistribute all of bgp with bad upstream
>> filtering?
> 
> 
> They perfectly re-advertized all mine. Loos like a huge mistake. And still
> ongoing.
> 
> Although this was nice to see:
> 
> ====================================================================
> RPKI Validation Failed (Code: 9)
> ====================================================================
> Your prefix:          199.47.80.0/21:
> Prefix Description:   NET-199-47-80-0-1
> Update time:          2014-04-02 20:29 (UTC)
> Detected by #peers:   1
> Detected prefix:      199.47.80.0/21
> Announced by:         AS4761 (INDOSAT-INP-AP INDOSAT Internet Network
> Provider,ID)
> Upstream AS:          AS4651 (THAI-GATEWAY The Communications Authority of
> Thailand(CAT),TH)
> ASpath:               18356 38794 4651 4761
> RPKI Status:          ROA validation failed: Invalid Origin ASN, expected
> 46851
> 
> Albeit ineffective.
> 
> ../C



More information about the NANOG mailing list