In many nations, IP spoofing is prohibited. Traffic is monitored by a number of government agencies, including the FBI and the National Security Agency (NSA), in order to discover potential threats to computer systems. Any faked packets or other attempts to hide IP addresses fall under this category.
In IP spoofing, a hacker modifies the source address in the packet header with tools to trick the receiving computer system into believing the packet is coming from a trusted source, such as another computer on a valid network, and accepting it. There are no external evidence of tampering because it happens at the network level.
You won't be able to track it down until you own the network, that is, the machines that routed the request.
Cyber Forensics Masterclass with Hands on learning