번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 1,561 | 2015/01/20 | 2003307 | ET MALWARE Comet Systems Spyware Cursor DL; [1] | 1,560 | 2015/01/20 | 2003306 | ET MALWARE 180solutions Spyware (tracked event 2 reporting); [1,2] | 1,559 | 2015/01/20 | 2003305 | ET DELETED Zango-Hotbar User-Agent (zbu-hb-); [1] | 1,558 | 2015/01/20 | 2003304 | ET MALWARE Effectivebrands.com Spyware Checkin; [1] | 1,557 | 2015/01/20 | 2003303 | ET POLICY FTP Login Attempt (non-anonymous); [1] | 1,556 | 2015/01/20 | 2003302 | ET TROJAN psyBNC IRC Server Connection; [1,2] | 1,555 | 2015/01/20 | 2003298 | ET MALWARE KMIP.net Spyware; [1,2] | 1,554 | 2015/01/20 | 2003297 | ET MALWARE Travel Update Spyware; [1] | 1,553 | 2015/01/20 | 2003296 | ET TROJAN Possible Web-based DDoS-command being issued; [1] | 1,552 | 2015/01/20 | 2003295 | ET WORM Allaple ICMP Sweep Reply Outbound; [1,2,3] | 1,551 | 2015/01/20 | 2003294 | ET WORM Allaple ICMP Sweep Ping Inbound; [1,2,3] | 1,550 | 2015/01/20 | 2003293 | ET WORM Allaple ICMP Sweep Reply Inbound; [1,2,3] | 1,549 | 2015/01/20 | 2003292 | ET WORM Allaple ICMP Sweep Ping Outbound; [1,2,3] | 1,548 | 2015/01/20 | 2003291 | ET MALWARE SOCKSv5 Bind Inbound (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,547 | 2015/01/20 | 2003290 | ET MALWARE SOCKSv5 Bind Inbound (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,546 | 2015/01/20 | 2003289 | ET MALWARE SOCKSv4 Bind Inbound (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,545 | 2015/01/20 | 2003288 | ET MALWARE SOCKSv4 Bind Inbound (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,544 | 2015/01/20 | 2003287 | ET MALWARE SOCKSv5 UDP Proxy Inbound Connect Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,543 | 2015/01/20 | 2003286 | ET MALWARE SOCKSv5 UDP Proxy Inbound Connect Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,542 | 2015/01/20 | 2003285 | ET MALWARE SOCKSv5 IPv6 Inbound Connect Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,541 | 2015/01/20 | 2003284 | ET MALWARE SOCKSv5 IPv6 Inbound Connect Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,540 | 2015/01/20 | 2003281 | ET MALWARE SOCKSv4 Port 5050 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,539 | 2015/01/20 | 2003280 | ET MALWARE SOCKSv4 Port 5050 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,538 | 2015/01/20 | 2003279 | ET MALWARE SOCKSv5 Port 5050 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,537 | 2015/01/20 | 2003278 | ET MALWARE SOCKSv5 Port 5050 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,536 | 2015/01/20 | 2003277 | ET MALWARE SOCKSv4 Port 1863 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,535 | 2015/01/20 | 2003276 | ET MALWARE SOCKSv4 Port 1863 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,534 | 2015/01/20 | 2003275 | ET MALWARE SOCKSv5 Port 1863 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,533 | 2015/01/20 | 2003274 | ET MALWARE SOCKSv5 Port 1863 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,532 | 2015/01/20 | 2003273 | ET MALWARE SOCKSv4 Port 5190 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,531 | 2015/01/20 | 2003272 | ET MALWARE SOCKSv4 Port 5190 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,530 | 2015/01/20 | 2003271 | ET MALWARE SOCKSv5 Port 5190 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,529 | 2015/01/20 | 2003270 | ET MALWARE SOCKSv5 Port 5190 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,528 | 2015/01/20 | 2003269 | ET MALWARE SOCKSv4 Port 443 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,527 | 2015/01/20 | 2003268 | ET MALWARE SOCKSv4 Port 443 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,526 | 2015/01/20 | 2003267 | ET MALWARE SOCKSv5 Port 443 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,525 | 2015/01/20 | 2003266 | ET MALWARE SOCKSv5 Port 443 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,524 | 2015/01/20 | 2003263 | ET MALWARE SOCKSv4 HTTP Proxy Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,523 | 2015/01/20 | 2003262 | ET MALWARE SOCKSv4 HTTP Proxy Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,522 | 2015/01/20 | 2003261 | ET MALWARE SOCKSv5 HTTP Proxy Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,521 | 2015/01/20 | 2003260 | ET MALWARE SOCKSv5 HTTP Proxy Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,520 | 2015/01/20 | 2003259 | ET MALWARE SOCKSv5 DNS Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,519 | 2015/01/20 | 2003258 | ET MALWARE SOCKSv5 DNS Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,518 | 2015/01/20 | 2003257 | ET MALWARE SOCKSv5 Port 25 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,517 | 2015/01/20 | 2003256 | ET MALWARE SOCKSv4 Port 25 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,516 | 2015/01/20 | 2003255 | ET MALWARE SOCKSv5 Port 25 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9] | 1,515 | 2015/01/20 | 2003254 | ET MALWARE SOCKSv5 Port 25 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9] | 1,514 | 2015/01/20 | 2003253 | ET MALWARE MarketScore Spyware Uploading Data; [1,2,3] | 1,513 | 2015/01/20 | 2003251 | ET MALWARE SpySheriff Intial Phone Home; [1,2] | 1,512 | 2015/01/20 | 2003250 | ET EXPLOIT Symantec Remote Management RTVScan Exploit; [1,2] | < 511 512 513 514 515 516 517 518 519 520 > |
|