FINDING · DETECTION

GFW probes originate from a dedicated /16 subnet of Chinese IP addresses distinct from ordinary client traffic, and a single suspicious connection can trigger dozens of independent probe connections from different source IPs within the same subnet. Blocking this probe-source range does not prevent blocking — the GFW blocks at a separate decision point — but it does make probe traffic distinguishable from legitimate users.

From 2015-ensafi-active-probingExamining how the Great Firewall discovers hidden circumvention servers · §4.2 · 2015 · IMC

Implications

Tags

censors
cn
techniques
active-probing

Extracted by claude-sonnet-4-6 — review before relying.