[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1030545215.741.79.camel@black.snosoft.com>
From: simon at snosoft.com (ATD)
Subject: Administrivia
Len,
I just got back from Greece. Would you like my recon team to help you
with any of these issues? If you have any ideas/needs please ask...
On Fri, 2002-08-16 at 08:57, Len Rose wrote:
>
> The following IP's have been used to attack the list so far:
>
> 210.90.247.95
> 211.35.78.36
> 216.241.164.234
> 211.155.243.99
> 202.108.119.186
> 80.48.107.254
> 211.234.92.6
> 200.193.46.18
> 142.176.152.106
> 63.203.134.106
> 63.229.231.25
> 211.251.108.122
> 65.121.80.1
> 206.74.35.50
> 66.87.93.107
> 200.189.163.7
> 66.105.71.168
> 216.235.32.129
> 132.229.228.228 << This one actually tried to break into the mail server.
> It's his Linux workstation at the Univ.
> 198.144.201.178 << This one actually tried to bypass mailman's "security".
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
--
-ATD-
That file you've been guarding, isn't.
-------------------------------------------------------------------
Secure Network Operations, Inc | http://www.snosoft.com
Cerebrum Project | cerebrum@...soft.com
Strategic Reconaissance Team | recon@...soft.com
-------------------------------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: This is a digitally signed message part
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20020828/19e1d9ed/attachment.bin
Powered by blists - more mailing lists