If you see this message, you have found a packet that is part of my master thesis at the university of Twente.
The goal of this master thesis is to trace a spoofed packet back to its true origin. This is done by observing catchments using an extensive anycast network combined with finely tuned BGP announcements. This packet simulates a spoofer with malicious intent and is sent to an IP address owned by the university of Twente. The transmission of the packet is done in collaboration with Brigham Young University. For testing purposes, a similar packet is sent every 30 seconds. Each packet is easily recognisable by the unique hostname that is present. We are not responding to any of these packets.
In case you have any questions or concerns, please do not hesitate to contact us by emailing me at: a [dot] vansanten [at] student [dot] utwente [dot] nl
Kind regards from the Netherlands, Aaron van Santen Student at the university of Twente