Particularly useful would be the ip address of the compromised server in the case of GPG and MD5 errors.