Quoting Jonathan Kline (jonathankl_2001 at yahoo.com): > This is interesting: > The headers from the last spam message.... > Received: from 209.26.175.43 (www.rdt.net [209.26.175.43] (may be > forged)) by sprite.real-time.com (8.11.1/8.11.1) with SMTP id > f2KJ2cl12495; Tue, 20 Mar 2001 13:02:40 -0600 > > May be forged? > > Interesting! Reverse and forward do not match. $ nslookup 209.26.175.43 Name: www.rdt.net Address: 209.26.175.43 $ nslookup www.rdt.net Name: www.rdt.net Address: 202.84.198.61 -- Bob Tanner <tanner at real-time.com> | Phone : (952)943-8700 http://www.mn-linux.org | Fax : (952)943-8500 Key fingerprint = 02E0 2734 A1A1 DBA1 0E15 623D 0036 7327 93D9 7DA3 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20010320/f3246ab3/attachment.pgp