In an IXP hijacking, the Network Operator establishes a “peering” connection between their ASN and a target ASN and announces hijacked ranges through the exchange.
Since IXPs often do not monitor their exchanges for network abuse, it often takes a long time to address problems, if at all.
Back to GlossaryDo you want to remove your IP/domain from one of our blocklists?
Please use our lookup-service and follow the instructions there in order to get that resolved.