FINDING · DETECTION

Six injected IPv4 addresses (8.7.198.46, 39.109.122.128, 46.82.174.69, 59.24.3.174, 93.46.8.90, 103.97.3.19) accept TCP SYN→SYN+ACK from within China but immediately reply RST when the client sends application data (PSH flag). These hosts mirror IPID values from probe packets, show no response from outside China, and appear to operate statelessly — suggesting GFW-controlled surveillance infrastructure that collects connection metadata without revealing itself.

From 2025-sheffey-extendedExtended Abstract: I’ll Shake Your Hand: What Happens After DNS Poisoning · §2.2.2 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
dns-poisoningrst-injection

Extracted by claude-sonnet-4-6 — review before relying.