IXP hijacking

In an IXP hijacking, the Network Operator establishes a “peering” connection between their ASN and a target ASN and announces hijacked ranges through the exchange.

Since IXPs often do not monitor their exchanges for network abuse, it often takes a long time to address problems, if at all.

Back to Glossary
Share
Linkedin Icon Twitter Icon Facebook Icon E-mal Icon
Get in touch

Talk to us

Do you want to remove your IP/domain from one of our blocklists?
Please use our lookup-service and follow the instructions there in order to get that resolved.