Resources for IT Partners

Information Security Observations of Our Staff

University Information Security (UIS) staff have identified items of interest as listed below in comma-separated values (CSV) files.  These items of interest are identified through direct observations of activity, through reports received by UIS, or other sources.

How you use the information is up to you.  For example, you may choose to block connectivity to IP addresses listed.

Use this information to inform your own security decisions, but please be aware of the following:

  • Your use of this information is at your own discretion.
  • You may use this information in other applications, including for commercial purposes, provided you include the Disclaimer text on this page.
  • You are responsible for the effects of using this information.
  • There is no warranty, i.e., this information is provided "as is" only.
  • The data represents a subjective viewpoint, not a claim of fact.

Data Files

List of IPs responsible for large numbers of failed logins for commonly targeted account names over the past three days.
Update Frequency
Every 24 hours
IP addresses observed behaving in odd or suspicious ways are listed here.
Update Frequency
Every 24 hours
IP addresses observed behaving in odd or suspicious ways are listed here. This is a short-duration list.
Update Frequency
These IP addresses are sources of recent unauthorized logins. Steps are taken to ensure that sources of legitimate logins are excluded to reduce the likelihood of false positives (e.g., where someone mistypes a password).
Update Frequency
Every 24 hours
Web clients making requests on systems for content that does not exist (and for several years has not existed) are added to this list. Sources are web server logs from specific hosts that do not provide actual content.
Update Frequency
Every 24 hours



Redistribution and use of the data provided, with or without modification, is permitted provided the copyright notice at the bottom of this page, this statement, and the following disclaimer are included:

University Information Security publishes the information on behalf of the University of Minnesota on an "AS IS" basis only.  Any express or implied warranties, including but not limited to the implied warranties of merchantability and fitness for a particular purpose are disclaimed.  In no event shall the copyright holder or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including but not limited to procurement of substitute services; loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of use of the information provided here, even if advised on the possibility of such damage.

The information provided makes no claim regarding a specific person's or organization's involvement in activity or actions taken with respect to computer or network security. The IP addresses are listed based solely on observed behavior with respect to interactions with University resources.