lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <3D6CE217.6090007@snosoft.com> From: dotslash at snosoft.com (KF) Subject: Administrivia That should have went to just Len and not the list I take it... I bet while on vacation you forgot about that brutal reply-to address. -KF ATD wrote: >Len, > I just got back from Greece. Would you like my recon team to help you >with any of these issues? If you have any ideas/needs please ask... > > >On Fri, 2002-08-16 at 08:57, Len Rose wrote: > >>The following IP's have been used to attack the list so far: >> >>210.90.247.95 >>211.35.78.36 >>216.241.164.234 >>211.155.243.99 >>202.108.119.186 >>80.48.107.254 >>211.234.92.6 >>200.193.46.18 >>142.176.152.106 >>63.203.134.106 >>63.229.231.25 >>211.251.108.122 >>65.121.80.1 >>206.74.35.50 >>66.87.93.107 >>200.189.163.7 >>66.105.71.168 >>216.235.32.129 >>132.229.228.228 << This one actually tried to break into the mail server. >> It's his Linux workstation at the Univ. >>198.144.201.178 << This one actually tried to bypass mailman's "security". >> >> >>_______________________________________________ >>Full-Disclosure - We believe in it. >>Charter: http://lists.netsys.com/full-disclosure-charter.html >>
Powered by blists - more mailing lists