번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
661 | 2015/01/20 | 2001985 | ET DELETED HTTP RBOT Challenge/Response Authentication; [1,2,3] |
660 | 2015/01/20 | 2001984 | ET POLICY SSH session in progress on Unusual Port; [1] |
659 | 2015/01/20 | 2001983 | ET POLICY SSHv2 Client New Keys Detected on Unusual Port; [1] |
658 | 2015/01/20 | 2001982 | ET POLICY SSHv2 Client KEX Detected on Unusual Port; [1] |
657 | 2015/01/20 | 2001981 | ET POLICY SSHv2 Server KEX Detected on Unusual Port; [1] |
656 | 2015/01/20 | 2001980 | ET POLICY SSH Client Banner Detected on Unusual Port; [1] |
655 | 2015/01/20 | 2001979 | ET POLICY SSH Server Banner Detected on Unusual Port; [1] |
654 | 2015/01/20 | 2001978 | ET POLICY SSH session in progress on Expected Port; [1] |
653 | 2015/01/20 | 2001977 | ET POLICY SSHv2 Client New Keys detected on Expected Port; [1] |
652 | 2015/01/20 | 2001976 | ET POLICY SSHv2 Client KEX Detected on Expected Port; [1] |
651 | 2015/01/20 | 2001975 | ET POLICY SSHv2 Server KEX Detected on Expected Port; [1] |
650 | 2015/01/20 | 2001974 | ET POLICY SSH Client Banner Detected on Expected Port; [1] |
649 | 2015/01/20 | 2001973 | ET POLICY SSH Server Banner Detected on Expected Port; [1] |
648 | 2015/01/20 | 2001972 | ET SCAN Behavioral Unusually fast Terminal Server Traffic, Potential Scan or Infection (Inbound); [1] |
647 | 2015/01/20 | 2001966 | ET DELETED Hotword Trojan - Possible FTP File Status Check ___; [1,2] |
646 | 2015/01/20 | 2001965 | ET DELETED Hotword Trojan - Possible FTP File Status Upload ___; [1,2] |
645 | 2015/01/20 | 2001964 | ET DELETED Hotword Trojan - Possible FTP File Request .tea; [1,2] |
644 | 2015/01/20 | 2001963 | ET DELETED Hotword Trojan - Possible FTP File Request pspv.exe; [1,2] |
643 | 2015/01/20 | 2001962 | ET DELETED Hotword Trojan - Possible File Upload CFXP; [1,2] |
642 | 2015/01/20 | 2001961 | ET DELETED Hotword Trojan - Possible File Upload CHJO; [1,2] |
641 | 2015/01/20 | 2001960 | ET DELETED Hotword Trojan inbound via http; [1,2] |
640 | 2015/01/20 | 2001959 | ET DELETED Hotword Trojan in Transit; [1,2] |
639 | 2015/01/20 | 2001949 | ET WEB_SPECIFIC_APPS Athena Web Registration Remote Command Execution Attempt; [1] |
638 | 2015/01/20 | 2001947 | ET MALWARE Zenotecnico Adware; [1,2] |
637 | 2015/01/20 | 2001944 | ET NETBIOS MS04-007 Kill-Bill ASN1 exploit attempt; [1,2,3] |
636 | 2015/01/20 | 2001933 | ET TROJAN PWS Banker Trojan Sending Report of Infection; [1,2] |
635 | 2015/01/20 | 2001929 | ET WEB_SPECIFIC_APPS XSS Possible Arbitrary Scripting Code Attack in phpBB (signature); [1,2] |
634 | 2015/01/20 | 2001928 | ET WEB_SPECIFIC_APPS XSS Possible Arbitrary Scripting Code Attack in phpBB (private message); [1,2] |
633 | 2015/01/20 | 2001921 | ET DELETED Greeting card gif.exe email incoming HTTP; [1,2] |
632 | 2015/01/20 | 2001920 | ET DELETED Greeting card gif.exe email incoming POP3/IMAP; [1,2] |
631 | 2015/01/20 | 2001919 | ET DELETED Greeting card gif.exe email incoming SMTP; [1,2] |
630 | 2015/01/20 | 2001910 | ET DELETED AIM Bot Outbound Control Channel Open and Login; [1] |
629 | 2015/01/20 | 2001909 | ET POLICY eBay Watch This Item; [1] |
628 | 2015/01/20 | 2001908 | ET POLICY eBay View Item; [1] |
627 | 2015/01/20 | 2001907 | ET POLICY eBay Placing Item for sale; [1] |
626 | 2015/01/20 | 2001906 | ET SCAN MYSQL 4.0 brute force root login attempt; [1,2] |
625 | 2015/01/20 | 2001904 | ET SCAN Behavioral Unusually fast inbound Telnet Connections, Potential Scan or Brute Force; [1,2] |
624 | 2015/01/20 | 2001901 | ET TROJAN Possible Bobax trojan infection; [1,2] |
623 | 2015/01/20 | 2001898 | ET POLICY eBay Bid Placed; [1] |
622 | 2015/01/20 | 2001895 | ET MALWARE ToolbarPartner Spyware Spambot Retrieving Target Emails; [1,2] |
621 | 2015/01/20 | 2001891 | ET USER_AGENTS Suspicious User Agent (agent); [1] |
620 | 2015/01/20 | 2001890 | ET MALWARE ToolbarPartner Spyware Agent Download (1); [1,2] |
619 | 2015/01/20 | 2001885 | ET MALWARE Begin2Search.com Spyware; [1,2] |
618 | 2015/01/20 | 2001884 | ET MALWARE DesktopTraffic Toolbar Spyware; [1,2] |
617 | 2015/01/20 | 2001882 | ET DOS ICMP Path MTU lowered below acceptable threshold; [1,2,3] |
616 | 2015/01/20 | 2001874 | ET EXPLOIT TCP Reset from MS Exchange after chunked data, probably crashed it (MS05-021); [1,2,3] |
615 | 2015/01/20 | 2001873 | ET EXPLOIT MS Exchange Link State Routing Chunk (maybe MS05-021); [1,2,3] |
614 | 2015/01/20 | 2001872 | ET MALWARE Visicom Spyware User-Agent (Visicom); [1] |
613 | 2015/01/20 | 2001871 | ET MALWARE Target Saver Spyware User-Agent (TSA); [1] |
612 | 2015/01/20 | 2001870 | ET MALWARE Surfplayer Spyware User-Agent (SurferPlugin); [1] |
< 521 522 523 524 525 526 527 528 529 530 > |