www.hypr.com Open in urlscan Pro
2606:2c40::c73c:6702  Public Scan

Submitted URL: https://get.hypr.com/e3t/Ctc/2I+113/cjZGQ04/VVV0g272M0HQW4F06GT5pQWwyW6-Tm8p4-HdBZN3ypqFD3q3nJV1-WJV7CgMt3W3C3D0C3bpH...
Effective URL: https://www.hypr.com/security-encyclopedia/ip-spoofing?utm_campaign=Newsletter&utm_medium=email&_hsmi=258764121&_hsen...
Submission: On May 21 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2670073/d034b54c-cf10-405c-8d74-984763f0ac71

<form id="hsForm_d034b54c-cf10-405c-8d74-984763f0ac71" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2670073/d034b54c-cf10-405c-8d74-984763f0ac71"
  class="hs-form-private hsForm_d034b54c-cf10-405c-8d74-984763f0ac71 hs-form-d034b54c-cf10-405c-8d74-984763f0ac71 hs-form-d034b54c-cf10-405c-8d74-984763f0ac71_ebdcc495-83dd-4a9a-b8ec-781bb0ce9b01 hs-form"
  target="target_iframe_d034b54c-cf10-405c-8d74-984763f0ac71" data-instance-id="ebdcc495-83dd-4a9a-b8ec-781bb0ce9b01" data-form-id="d034b54c-cf10-405c-8d74-984763f0ac71" data-portal-id="2670073" data-hs-cf-bound="true">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-d034b54c-cf10-405c-8d74-984763f0ac71" class="" placeholder="Enter your Email Address" for="email-d034b54c-cf10-405c-8d74-984763f0ac71"><span>Email
        Address</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-d034b54c-cf10-405c-8d74-984763f0ac71" name="email" required="" placeholder="Enter Your Email" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1684675497608&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1682458846913&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;isLegacyThemeAllowed&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;How does IP Spoofing work? | Security Encyclopedia&quot;,&quot;pageUrl&quot;:&quot;https://www.hypr.com/security-encyclopedia/ip-spoofing?utm_campaign=Newsletter&amp;utm_medium=email&amp;_hsmi=258764121&amp;_hsenc=p2ANqtz-8lSEDbS5KTiMT38ebEHKlxu0RlICQ4Th-WefSq9Fr1BwBpabcWmicW2KUDeVgdGyV7qG80cHk_NPk0PpXWQqAl6o7Mau0P1s1JZlxXQOYVXRfrqTs&amp;utm_content=258764121&amp;utm_source=hs_email&quot;,&quot;pageId&quot;:&quot;61588288653&quot;,&quot;urlParams&quot;:{&quot;utm_campaign&quot;:&quot;Newsletter&quot;,&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;258764121&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-8lSEDbS5KTiMT38ebEHKlxu0RlICQ4Th-WefSq9Fr1BwBpabcWmicW2KUDeVgdGyV7qG80cHk_NPk0PpXWQqAl6o7Mau0P1s1JZlxXQOYVXRfrqTs&quot;,&quot;utm_content&quot;:&quot;258764121&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://www.hypr.com/security-encyclopedia/ip-spoofing&quot;,&quot;contentType&quot;:&quot;standard-page&quot;,&quot;hutk&quot;:&quot;c3c286ee83be10c472c01d4cd2473a76&quot;,&quot;__hsfp&quot;:1944070336,&quot;__hssc&quot;:&quot;106589212.1.1684675498911&quot;,&quot;__hstc&quot;:&quot;106589212.c3c286ee83be10c472c01d4cd2473a76.1684675498911.1684675498911.1684675498911.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-ebdcc495-83dd-4a9a-b8ec-781bb0ce9b01&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1684675498966,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2670073&quot;,&quot;formId&quot;:&quot;d034b54c-cf10-405c-8d74-984763f0ac71&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-ebdcc495-83dd-4a9a-b8ec-781bb0ce9b01&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;css&quot;:&quot;&quot;,&quot;translations&quot;:{&quot;en&quot;:{&quot;blockedEmail&quot;:&quot;Invalid email. Please enter your corporate email address to continue.&quot;,&quot;invalidEmail&quot;:&quot;Invalid email. Please enter your corporate email address to continue.&quot;,&quot;required&quot;:&quot;Invalid email. Please enter your corporate email address to continue.&quot;}},&quot;locale&quot;:&quot;en&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;ebdcc495-83dd-4a9a-b8ec-781bb0ce9b01&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3211&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3211&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3211&quot;,&quot;_debug_allPageIds&quot;:{&quot;analyticsPageId&quot;:&quot;61588288653&quot;,&quot;pageContextPageId&quot;:&quot;61588288653&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1684675497776,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved customer callbacks used on embed context: [\&quot;onFormSubmit\&quot;]&quot;},{&quot;clientTimestamp&quot;:1684675497777,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;How does IP Spoofing work? | Security Encyclopedia\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.hypr.com/security-encyclopedia/ip-spoofing?utm_campaign=Newsletter&amp;utm_medium=email&amp;_hsmi=258764121&amp;_hsenc=p2ANqtz-8lSEDbS5KTiMT38ebEHKlxu0RlICQ4Th-WefSq9Fr1BwBpabcWmicW2KUDeVgdGyV7qG80cHk_NPk0PpXWQqAl6o7Mau0P1s1JZlxXQOYVXRfrqTs&amp;utm_content=258764121&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.126 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_campaign\&quot;:\&quot;Newsletter\&quot;,\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;258764121\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz-8lSEDbS5KTiMT38ebEHKlxu0RlICQ4Th-WefSq9Fr1BwBpabcWmicW2KUDeVgdGyV7qG80cHk_NPk0PpXWQqAl6o7Mau0P1s1JZlxXQOYVXRfrqTs\&quot;,\&quot;utm_content\&quot;:\&quot;258764121\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;pageId\&quot;:\&quot;61588288653\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1684675497778,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1684675498951,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;c3c286ee83be10c472c01d4cd2473a76\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://www.hypr.com/security-encyclopedia/ip-spoofing\&quot;,\&quot;contentType\&quot;:\&quot;standard-page\&quot;,\&quot;pageId\&quot;:\&quot;61588288653\&quot;}&quot;}]}"><iframe
    name="target_iframe_d034b54c-cf10-405c-8d74-984763f0ac71" style="display: none;"></iframe>
</form>

Text Content

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and improve your browsing
experience. To find out more, see our cookie policy.

If you decline, your information won’t be tracked. A single cookie will be used
in your browser to remember your preference not to be tracked.

Cookies settingsAcceptDecline
   It's Here! The Third Annual State of Passwordless Security Report | Learn
More
✕
Skip to content
HYPR - The Passwordless Company

Looking for the HYPR logo and visual assets? Check out our Media Kit.

 * Solutions
    * True Passwordless MFA for the Workforce
    * Passwordless Customer Authentication
    * True Passwordless SSO
    * Passwordless Remote Login
    * HYPR Enterprise Passkeys
    * True Passwordless MFA for Financial Services
    * Explore All Solutions
    * Pricing

 * Platform
    * App
    * Desktop MFA Client
    * Control Center
    * SDK
    * Passwordless Integrations
    * Explore the Platform
    * Compliance

 * Resources
    * Resource Center
    * Customer Stories
    * FIDO Guides
    * Security Encyclopedia
    * The Definitive Passwordless Guide
    * Blog
   
   How Much do Passwords Cost You?
   Find Out Now
 * Support
    * Customer Success
    * Knowledge Base
    * User Guide
    * Documentation
    * API Reference
    * System Status
    * Get Support

 * Company
    * About Us
    * Careers
    * Events
    * News Room
    * Partners
    * Contact Us

 * Search
   Search
 * Get a Demo

Encyclopedia IP Spoofing


SECURITY ENCYCLOPEDIA


IP SPOOFING

IP Spoofing, or IP address spoofing, is a cyberattack where the adversary
impersonates a legitimate website by displaying disinformation on IP packets.
Specifically, the they alter IP packet header information to misinform users
concerning the source of the information.

IP spoofing enables hackers to conduct Denial of Service or Distributed
Denial-of-Service (DoS, DDoS) and man-in-the-middle (MITM) attacks. These
respective attacks disrupt or reroute legitimate traffic to illegitimate
websites, or attract legitimate users for nefarious aims such as capturing their
credentials or bankcard data.

In the DoS/DDoS use case for IP spoofing, the intentional mislabeling of IP
origin facilitates bulk nuisance requests by concealing a botnet. To mitigate
the threat of IP spoofing-enabled DoS/DDoS attacks, enterprises use deep packet
inspection (DPI) to read complete header information, instead of IP source
information alone.


EXAMPLE:

"A few of our users fell victim to IP spoofing and entered their credentials
into a website that looked like ours. The counterfeit site was convincing even
down to the header info. Now a number of users' accounts are experiencing ATO."


PreviousIoT AuthenticationKeyNext
A B C D E F G H I K L M N O P Q R S T U V W Z
Popular Pages
Rainbow Table Attack Keylogger Passkeys Public Key Cryptography

Share This Post

linkedintwitterfacebook


QUICK LINKS

 * Contact Us
 * Blog
 * Careers
 * Support
 * Vulnerability Disclosure
 * Accessibility

SOLUTIONS

 * True Passwordless MFA for the Workforce
 * Passwordless Customer Authentication
 * True Passwordless MFA for Financial Services


READY TO GO PASSWORDLESS?

Get a free personalized demo and see for yourself how easy it is to eliminate
passwords for your workforce and customers.

Get a Demo

RECEIVE UPDATES AND NEWS FROM HYPR

Email Address*


HYPR - The Passwordless Company

Copyright 2023 HYPR Corp

 * Status
 * Privacy
 * Terms
 * Legal

 * linkedin
 * twitter
 * youtube
 * facebook




We Love Cookies
This website uses cookies to enhance your experience.
 * Solutions
   * True Passwordless MFA for the Workforce
   * Passwordless Customer Authentication
   * True Passwordless SSO
   * Passwordless Remote Login
   * HYPR Enterprise Passkeys
   * True Passwordless MFA for Financial Services
   * Explore All Solutions
   * Pricing
 * Platform
   * App
   * Desktop MFA Client
   * Control Center
   * SDK
   * Passwordless Integrations
   * Explore the Platform
   * Compliance
 * Resources
   * Resource Center
   * Customer Stories
   * FIDO Guides
   * Security Encyclopedia
   * The Definitive Passwordless Guide
   * Blog
 * Support
   * Customer Success
   * Knowledge Base
   * User Guide
   * Documentation
   * API Reference
   * System Status
   * Get Support
 * Company
   * About Us
   * Careers
   * Events
   * News Room
   * Partners
   * Contact Us
 * icon-search
 * Get a Demo


Search
Search