lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <871080DEC5874D41B4E3AFC5C400611E02B35291@UTDEVS02.campus.ad.utdallas.edu> From: pauls at utdallas.edu (Schmehl, Paul L) Subject: Administrivia Hopefully you reported the Univ one to the security department. Paul Schmehl (pauls@...allas.edu) Supervisor of Support Services The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/~pauls/ > -----Original Message----- > From: Len Rose [mailto:len@...sys.com] > Sent: Friday, August 16, 2002 7:57 AM > To: full-disclosure@...ts.netsys.com > Subject: [Full-Disclosure] Administrivia > > > > The following IP's have been used to attack the list so far: > > 210.90.247.95 > 211.35.78.36 > 216.241.164.234 > 211.155.243.99 > 202.108.119.186 > 80.48.107.254 > 211.234.92.6 > 200.193.46.18 > 142.176.152.106 > 63.203.134.106 > 63.229.231.25 > 211.251.108.122 > 65.121.80.1 > 206.74.35.50 > 66.87.93.107 > 200.189.163.7 > 66.105.71.168 > 216.235.32.129 > 132.229.228.228 << This one actually tried to break into the > mail server. > It's his Linux workstation at the Univ. > 198.144.201.178 << This one actually tried to bypass > mailman's "security". > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html >
Powered by blists - more mailing lists