It is fully possible to send data with a fake sender IP. You’ll have a hard time getting replies though, since the replies will be sent to the fake IP and never reach you. Additionally, if you send data with a “from” IP that a router doesn’t expect to arrive from you, the router will often simply drop it, and sometimes inform the ISP that you’re up to something that violates your TOS.
EDIT: In response to edited post.
Any protocol (such as HTTP) that is built on top of a connection-oriented protocol (TCP) will require a valid IP. The cases where fake IPs have been prevalent mostly involve Denial Of Service attacks, using UDP, ICMP or the initial SYN packet in a TCP handshake.
Related Posts:
- TCP vs UDP – What is a TCP connection? [duplicate]
- what is the diffrence between TCP TAHOE and TCP RENO
- TCP/IP packets and datagrams
- What is the difference between Unix sockets and TCP/IP sockets?
- How do high traffic sites service more than 65535 TCP connections?
- How can I convert MP3 file to a Base64 encoded string? [closed]
- ping response “Request timed out.” vs “Destination Host unreachable”
- What does “:=” mean in Pseudocode? [closed]
- Why do we need virtual functions in C++?
- Eclipse IDE for Java – Full Dark Theme
- Amazon Linux: apt-get: command not found
- What does the Java assert keyword do, and when should it be used?
- How to accept space in regex?
- Is a wildcard CNAME DNS record valid?
- File extension .DB – What kind of database is it exactly?
- How to resolve “The requested URL was rejected. Please consult with your administrator.”
- Why Puma listen on ‘tcp://localhost:3000’ instead of ‘http://localhost:3000’
- Difference between binary semaphore and mutex
- Python Logic of ListNode in Leetcode
- What is the difference between a strongly typed language and a statically typed language?
- How do I learn WebGL the fast way?
- What is the meaning of t=”shared” in a formula element?
- MySQL Every derived table must have its own alias
- How to print out a backslash in LaTeX
- Echo newline in Bash prints literal \n
- Only one usage of each socket address (protocol/network address/port) is normally permitted?
- Proper shebang for Python script
- AttributeError: can’t set attribute
- How to kill a running Spark application?
- Sqoop Incremental Import
- What does it mean by word size in computer?
- Python setup.py develop vs install
- Hidden field “ufprt” being added to Razor Umbraco Form – Why?
- Raise to power in R
- APDU command to read Track1/track2 data from NFC card and MobileApp
- Does TCP send a SYN/ACK on every packet or only on the first connection?
- enum to string in modern C++11 / C++14 / C++17 and future C++20
- ORA-29913: error in executing ODCIEXTTABLEOPEN callout when inserting csv into oracle
- Reason for the exception java.lang.VerifyError: Bad type on operand stack
- git: fatal unable to auto-detect email address
- R error which says “Models were not all fitted to the same size of dataset”
- pandoc document conversion failed with error 43 : pdflatex: The memory dump file could not be found
- ERROR: transport error 202: bind failed when starting Tomcat 7 in debug mode
- How to check whether a Button is clicked by using JavaScript
- jQuery onclick not firing on dynamically inserted HTML elements?
- What is correct media query for IPad Pro?
- simple IPython example raises exception on sys.exit()
- How to get a minecarft session ID?
- Factory Pattern. When to use factory methods?
- How to send a PUT/DELETE request in jQuery?
- Arithmetic Overflow in mips
- How to change angular port from 4200 to any other
- Render HTML string as real HTML in a React component
- How to draw lines in Java
- Styling Select Drop down box
- NoClassDefFoundError in Java: com/google/common/base/Function
- Where are the ampersand and vertical bar characters used in Python?
- Which font is used in MS-DOS?
- Python: What OS am I running on?
- ER-Diagram: Ternary Relationship – How to read properly?
- How can I diff 2 files while ignoring leading white space
- Converting time stamps in excel to dates
- The name ‘InitializeComponent’ does not exist in the current context
- What are examples of TCP and UDP in real life?
- What is “pass-by-name” and how does it work exactly?
- is it possible to get the MAC address for machine using nmap
- Import error No module named skimage
- Java: Not a statement
- Passing a hexadecimal value into a module in Verilog
- mport win32ui in python 3.6
- Empty functions in Javascript
- Solr: how to delete a collection?
- IP address whitelist to update WordPress core and plugins
- Call to undefined function `get_plugin_data()`
- Contact Form 7 – Execute code AFTER mail send [closed]
- Is there any reason only 1 (my) IP would be added to this table using $wpdn->insert?
- TwentyTwentyTwo – How to add PHP logic to Post templates?
- How can I trash multiple posts at once from the front end?
- Maintenance holding page while migrating website
- Multiple og:image for Facebook
- Rendering javascript in render_callback php Code
- How do I limit access to wp-admin to an IP range?
- Customized Essay Writing Service
- Exclude categories with only sticky posts OR count sticky post of specific category
- Test for IP in Array Always Fails on First IP
- In systemd, what’s the difference between After= and Requires=?
- Windows Server restart / shutdown history
- How do I set the global PATH environment variable on OS X?
- nmap find all alive hostnames and IPs in LAN
- Should CNAME Be Used For Subdomains?
- How do I create user accounts from the Terminal in Mac OS X 10.5?
- How to get a .pem file from ssh key pair?
- How to inspect remote SMTP server’s TLS certificate?
- Choosing between meaningful and meaningless hostnames [closed]
- logrotating files in a directories and its subdirectories
- Multiple TXT fields for same subdomain
- How to restart Nginx on Mac OS X?
- Do SPF Records For Primary Domain apply to subdomains?
- Why is the response on localhost so slow?
- apache2: Could not reliably determine the server’s fully qualified domain name, using 127.0.1.1 for ServerName