Hi,
have you tried
postmaster@[%REMOTEIP%],root@[%REMOTEIP%],abuse@[%REMOTEIP%]
THIS will at least attempt to delivery it to the CORRECT (sending) mail
server. Which does't mean it won't bounce back - but those who DO reach
someone at won't be an "innocent" party.
Your other option is
>Below are the headers of a message that got caught by the CR vulnerability
>test in Declude Virus. I got an email from the
>[EMAIL PROTECTED] bitching me out because I was an idiot, as an
>admin I should know how to read headers, and that the headers clearly
>indicate that this email had nothin