Final update: May 28, 2015
CAIDA has taken over stewardship of the Spoofer project. We have deployed a supported server instance at CAIDA and released updated client software that supports IPv6 on all platforms, and coordinates measurement with the CAIDA server.
Update: Jul 25, 2013
We've contributed some new data analysis to an Internet Society Article.
Update: Jun 30, 2013
New analyses and details available from our Summary Page.
Update: Jan 24, 2012
System experienced hardware failure. Down until Jun 7, 2012, when we moved to new hardware.
Update: Sep 16, 2009
Most recent research paper, set to appear at IMC 2009, available now in the publications section.
Update: May 8, 2009
New version 0.8 of the IP spoofer tester; now implements IPv6 spoofing on *nix platforms (win32 in works).
Update: Mar 27, 2009
New version 0.7.3 of the IP spoofer tester; see the changelog for details. Enjoy screenshots.
Update: Mar 6, 2009
New version 0.7 of the IP spoofer tester; see the changelog for details.
Update: Feb 21, 2009
Revamped web site, generated reports, summaries, etc to take advantage of new client tester. Added screenshots example section.
Update: Feb 19, 2009
New version 0.6.2 of the IP spoofer tester; see the changelog for details.
Update: Feb 12, 2009
Presented a spoofer project update at CAIDA's ISMA AIMS workshop.
Update: Jan 5, 2009
Spoofer project now integrated with CAIDA's Ark Project in order to perform distributed measurement. Thanks to kc and Young!
Update: Nov 21, 2006
New version 0.5 of the IP spoofer tester. Now supports all versions of Windows using raw ethernet. See the changelog for details.
Update: May 19, 2006
Added Slashdot Response web page. On May 2, 2006 the Spoofer Project was posted to Slashdot. Thousands of Slashdot users downloaded and the IP source spoofing client thereby contributing to our aggregate Spoofing Summary. Thanks! We sincerely appreciate the interest and feedback. We've created a Slashdot Response web page that addresses the most common questions and comments posted by Slashdot readers.