This document explores IP traceback techniques to identify the sources of network attacks, emphasizing the need for robust methods due to frequent IP spoofing. It categorizes existing approaches into link testing, packet marking, ICMP traceback, and logging, detailing their mechanisms and limitations. A novel passive IP traceback (PIT) method is proposed to analyze path backscatter messages from routers to trace back to attackers without requiring extensive deployment efforts.