The ASN Shell Game: How Criminals Evade IP Blocklists
Learn how cybercriminals shuffle IP blocks between ASNs to evade blocklists. The Ukrainian FDN3 case reveals infrastructure patterns defenders can track.

I just read this fascinating report from The Hacker News about IP networks launching massive brute-force attacks, and it completely changed how I think about network defense.
The "Shell Game" Problem
Here's what got my attention: these criminals aren't just using one network. They're shuffling the same IP blocks between multiple ASNs (Autonomous System Numbers) to evade blocking.
The pattern from the report:
- AS211736 (FDN3)
- AS61432 (VAIZ-AS)
- AS210950 (ERISHENNYA-ASN)
- AS210848 (TK-NET)
All registered in August 2021. All swapping IP blocks between each other.
When you block one ASN, they just announce the same IPs from another. Same criminals, same attacks, different "license plate."
From the report:
"Those were all allocated in August 2021 and often exchange IPv4 prefixes with one another to evade blocklisting and continue hosting abusive activities."
This isn't just clever – it's exploiting a fundamental gap in how most defenders think about blocking.
The Investigation Workflow
When investigating attack traffic, I now look for three things:
1. Which ASN is currently announcing the attacking IPs?
- whois -h whois.cymru.com " -v [IP]" or bgp.he.net
- Look for: Multiple attack IPs from the same ASN
2. When were these ASNs registered?
- Tool: RIPE Stat or whois AS[number]
- Red flag: Multiple suspicious ASNs created in the same timeframe
3. Are IP blocks moving between these ASNs?
- Tool: Historical BGP data from Shodan or BGPmon
- Red flag: Prefixes announced by different ASNs over weeks/months
What The Case Taught Me
The Case investigation revealed specific patterns that made this criminal infrastructure more detectable:
Coordination Indicators:
- Multiple ASNs registered in the same month (August 2021)
- IP prefixes moving between these ASNs
- Shared peering relationships with known bulletproof providers
- Offshore shell companies as registration fronts
Critical Caveats: Don't Block Blindly
Before you start blocking ASNs, understand this:
The False Positive Problem
Legitimate entities that might show these patterns:
- Startups launching new infrastructure
- Regional ISPs in developing countries
- Cloud providers expanding to new markets
- Universities and research networks
- Small hosting companies
Blocking an entire ASN can:
- Cut off legitimate customers
- Violate service agreements
- Create discrimination issues
- Miss the actual threat (if attacks move to another ASN)
Defense Heuristics
1. Multiple ASNs registered in the same month + prefix swapping = investigate
2. IP blocks moving between ASNs within weeks = suspicious
3. ASNs with offshore registration + attack traffic = high priority review
These are investigation triggers, not blocking rules.
Bottom Line
Thanks to this research, I'm not just blocking attack IPs anymore. I'm tracking the ASN relationships and infrastructure patterns.
Criminals are thinking strategically about network infrastructure. We should too.
What patterns have you noticed in your attack logs? Share your findings and tag me on LinkedIn.
Newsletter
Join The Crowd!
No spam, unsubscribe at any time.