Quoting Jonathan Kline (jonathankl_2001 at yahoo.com):
> This is interesting:
> The headers from the last spam message....
> Received: from 209.26.175.43 (www.rdt.net [209.26.175.43] (may be
> forged)) by sprite.real-time.com (8.11.1/8.11.1) with SMTP id
> f2KJ2cl12495; Tue, 20 Mar 2001 13:02:40 -0600 
> 
> May be forged?
> 
> Interesting!

Reverse and forward do not match.

$ nslookup 209.26.175.43
Name:    www.rdt.net
Address:  209.26.175.43

$ nslookup www.rdt.net
Name:    www.rdt.net
Address:  202.84.198.61
-- 
Bob Tanner <tanner at real-time.com>       | Phone : (952)943-8700
http://www.mn-linux.org                 | Fax   : (952)943-8500
Key fingerprint = 02E0 2734 A1A1 DBA1 0E15  623D 0036 7327 93D9 7DA3

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20010320/f3246ab3/attachment.pgp