You might be the intermediary in a DNS reflector attack (see
http://www.icir.org/vern/papers/reflectors.CCR.01/index.html for
details)
--Steve Bellovin, http://www.research.att.com/~smb
Full text of "Firewalls" book now at http://www.wilyhacker.com