Wow, this is becoming very interesting. So, after returning here several times since FP posted this 13+ hours ago, you finally reply by calling him a liar. I only have the facts that have been presented here, so let me add a couple of my own. You say that you know how IP addresses work, so you are aware that ISP's are assigned blocks of IP addresses by region. With that in mind, it would not be possible for a user in Texas to have an IP address that matches a users IP address in New Jersey even if by the rare chance that DHCP released the IP from one user and assigned it to the other user. Ok, what about IP spoofing? Maybe this user in Texas

somehow found out the IP address that your current lease was attached to. Well, that won't fly either, because IP spoofing is designed to hide your IP address by creating IP packets that contain bogus IP addresses in an effort to impersonate other connections and hide your identity when you send information. While it would be theoretically possible for a user to obtain your IP and spoof it, it is highly improbable to consistently do that within this forum over a prolonged period of time. Lets look at another fact that FP stated. He said that these 4 accounts utilized multiple IP addresses. Now this really complicates things. Can you find any post in this forum that you did not personally make? If not, then the only conclusion that can be made is that you have used more than one computer to make posts on this forum. Now, that would mean that this malicious impostor would not only have to know the IP address for one of your computers, but he would have to have some mystical power to obtain the IP's of multiple computers that you utilize. Then he would have to come up with a spoofing scheme to randomly utilize your multiple IP addresses while logged into this forum. I am pretty good with this stuff(in theory), but DAMN.... this sure seems like a lot of work to do over an extended period of time to to lay a foundation to steal a couple of hundred dollars off of an unsuspecting forum member. You say that you understand how IP addresses work, so you can certainly appreciate the level of effort that would be involved to perpetrate a low level crime like this. We will not even go into the exchanged emails and phone calls involved in this transaction.
So, taking your statement into account..... There are 2 possible explanations:
!. FP is a total idiot and does not know how to read an activity log.
2. You are a thief.
From where I sit right now..... hmmmmm...... I think I know which conclusion I will favor.