Thanks for all the replies, it has given me a lot to think about. I was just interested in taking any MAC (spoofed or not) and trying to extract as much information as possible from it. Including possibly checking to see if it is legit or not.
The reasoning behind my project is as follows: I lived in a college community and regularly have people trying to connect to my wifi network. I regularly check my network for new devices trying to see who/what is trying to connect. I know how to white/black list and do as necessary. But I like to know what is trying to connect. I know tools out there exist that can do this for me, but I wanted to work on my programming some and figure this would be a nice project.