Since raising the issues of Cybersecurity from adverse IP addresses, many have suggested that the actual IP Address reported as an Adverse IP could be a 'spoofed' or a masked IP Address that hides the true IP to that of the reported IP for the HTTP transaction.
So, it has been suggested for example, that a cybercriminal in the United States, could easily go into Adapter Settings on Windows, or use 'ifconfig' on Linux, to change the IP Address to that of a Chinese IP Address and then plan and execute cyber-attacks.
Whilst theoretically suggested, however, such consideration has to include the full architecture of how an entity accesses the Internet. To access the Internet, the entity has to use an Internet Service Provider (ISP), that provides the Internet connectivity. So, whilst all entities would use an ISP to connect to, the individual ISP would then provide the further connections within and outside the jurisdiction, say of Australia. So, it is this ISP who is ultimately responsible for managing and administering its allocated IP Addresses to the connected entities.
ISPs are allocated IP Addresses by IANA, based on the Country of Jurisdiction. So, IANA, has a list of allocated IP Addresses per country. A list of allocated IP Addresses that are used can be accessed on:
Thereafter, when an Entity requests connection to the Internet, from the IP Addresses allocated to the ISP by IANA, a individual IP Address is allocated.
The second important technology for Internet connection is, the concept of ISP Gateway. Every individual ISP has its own Gateway through which an entity accesses the Internet, very often managed by the IP Block allocation of the ISP. Such Gateways eventually then connect to a Distribution Router that then connects to the Core Router of the ISP. The Core Router is a Backbone Router for an ISP and provides connections between jurisdictions and countries.
So, all technologies, including the individual Entity IP Address, the Gateway and the Core Router is essential to connect successfully to the Internet, and each of them are allocated an IP Address as per allocated by IANA.
Hence, such a technology architecture of Internet Connection, essentially eliminates the possibility of connection, by using a randomly allocated IP Address to any Entity. If a person attempts to change their individual IP Address using Windows Adapter Settings or 'ifconfig' in Linux, the connection would firstly be refused at the Gateway for a connection. Thereafter such data packets would not be autheticated by the Distribution Router and the Core Router of the ISP, if such an IP Address is not belonging to the ISP. It would mostly be a dropped data packet by the ISP, and the entity would not be able to use the Internet.
Whilst VPNs are also suggested as a possible tool for Cybercriminals to use to hide their real geo-location, all Entities, including VPN Service Providers have to use an ISP to connect to the Internet. So, as per the jurisdiction efficiency of IP Addresses are concerned, it is not possible to use a VPN Service to route via a foreign geo-location IP Addresses, violating the ISP Services of the VPN Provider included in the transaction. So, when a person VPNs to a US IP Address, this IP Address is still allocated to a ISP Service Provider in the US, that is then leased to the VPN Service provider.
A person in Australia, could use a VPN Service to plan Cyber-Attacks using a US IP Address, however, the US IP Address would still be a leased IP Address from a ISP Provider in the US.
Overall, due to the architecture of the Internet, the established Telecommunication regulations, protocols and practices and the technologies involved, it is impractical to change one's own IP Address manually and connect to the Internet. Simply, this manual and random allocation of a self-IP Address will not create a valid Internet Connection.