Fake key looks like a real key, even if you would check it with another user from the same IP:
User A has a fake key, when user A logs in, it sees itself with key.
When user B from the same IP as user A logs in, it will see user A with key.
When user C from another IP than user A logs in, he will not see user A with key.