There must be some sort of command that gets this reply from the server. If you know it, you will have to tell us about it, and what arguments the command takes.
Heh, there is a command to get the normal full unmasked host. Only downside, you have to be a Sysop to use it.
/userhost <nickname> returns full unmasked hostmask of a user but requires you to have a certain flag first to allow you to use that command. (Being a TechAdmin on a server has its perks )
Other than that I dont know of any way round it.
Regards
Ian-Highlander
"Insanity Takes Its Toll, Please Have Exact Change"
open a dcc chat to the person. close the dcc right after initiating it and you'll see what ip your client/eggdrop tried to connect to (=real ip, not masked). Yeah, i think it's virtually impossible to combine this in a script, but this is a way to get their real ip.
Im willing to bet the person that you saw use a bot to unmask that host had cracked the masking keys. Than you would just make a simple proc to apply this algorithm to the hostmask.
Unless, of course, this bot had IRCop privleges. On UnrealIRCd 3.2 beta 1 and up, the algorithm is almost impossible to crack.