If I were to give that list of IP addresses to anyone wanting to do my company harm they could bring the entire factory to a screeching halt in seconds with a few key strokes and mouse clicks. It would take months to find the code insertions.
Not if you had secured copies of the latest total system software every time it is modified.
In addition, I remember clearly that even in the DOS era, there was always available at least one utility which compared two files bit for bit, to verify exact copies, with no modifications of any sort.
blackdog is smartdoggie.