Bad ASN List
The Bad ASN list catalogs Autonomous System Numbers (ASNs) associated with bulletproof hosting, botnets, persistent abuse, and other malicious infrastructure. These are networks where abusive activity is tolerated or even facilitated by the operator rather than being the result of individual compromised servers. We use this data on robtex.com and rtsak.com to flag ASNs with documented histories of hosting abuse.
Source:Bad ASN List
What is the Bad ASN List?
Every network on the internet is identified by an Autonomous System Number. An ASN represents a collection of IP address ranges under a single administrative entity, typically an ISP, hosting provider, enterprise, or content delivery network. Most ASNs represent legitimate operations, but some are operated specifically to support malicious activity.
The Bad ASN list identifies networks that fall into several categories:
- Bulletproof hosting - Providers that explicitly ignore abuse complaints and allow customers to host malware, phishing, spam infrastructure, and other malicious content without risk of takedown
- Botnet infrastructure - Networks where a disproportionate share of IP addresses participate in botnet activity, either as C2 servers or as compromised hosts
- Persistent spam sources - ASNs responsible for sustained high-volume spam operations that resist cleanup despite repeated abuse reports
- Malware distribution - Networks hosting exploit kits, malware download servers, and drive-by attack infrastructure
- Abusive hosting - Providers with consistently poor abuse response, allowing their networks to be used for attacks, scanning, and other malicious operations
The distinction between a "bad ASN" and a large network that happens to have some abusive users is important. Major cloud providers like AWS or Hetzner have abuse on their networks, but they actively respond to reports and take down malicious customers. A "bad ASN" represents a network where the operator is complicit in or indifferent to the abuse occurring on their infrastructure.
The list is compiled from observations by security researchers, abuse report response tracking, and analysis of malicious traffic patterns across the internet.
How We Use This Data
On AS lookup pages on robtex.com and rtsak.com, we check whether the queried ASN appears on the Bad ASN list. If it does, we display an indicator with the classification. This context helps network engineers and security analysts understand the reputation of networks they encounter in their logs and investigations.
When investigating suspicious traffic, knowing that the source ASN is classified as bulletproof hosting or a known botnet host provides immediate context. It shifts the assessment from "this IP is suspicious" to "this IP comes from a network known for supporting malicious operations."
The data also complements IP-level reputation signals. An IP with moderate abuse reports that belongs to a Bad ASN carries more weight than the same reports from an IP on a reputable network, because the network context suggests the abuse is intentional rather than incidental.