| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
| 13,211 | 2015/01/20 | 2016064 | ET DELETED Popads Exploit Kit font request 32hex digit .eot; |
| 13,210 | 2015/01/20 | 2016063 | ET CURRENT_EVENTS PHISH PayPal - Account Phished; |
| 13,209 | 2015/01/20 | 2016062 | ET TROJAN Linux/Chapro.A Malicious Apache Module CnC Beacon; [1] |
| 13,208 | 2015/01/20 | 2016061 | ET WEB_SPECIFIC_APPS Possible WordpressPingbackPortScanner detected; [1,2,3] |
| 13,207 | 2015/01/20 | 2016060 | ET CURRENT_EVENTS CoolEK - Jar - Jun 05 2013; |
| 13,206 | 2015/01/20 | 2016059 | ET CURRENT_EVENTS CoolEK - Old PDF Exploit - Dec 18 2012; |
| 13,205 | 2015/01/20 | 2016058 | ET DELETED CoolEK - New PDF Exploit - Dec 18 2012; |
| 13,204 | 2015/01/20 | 2016057 | ET DELETED CoolEK Font File Download Dec 18 2012; |
| 13,203 | 2015/01/20 | 2016056 | ET CURRENT_EVENTS Unknown_gmf EK - flsh.html; |
| 13,202 | 2015/01/20 | 2016055 | ET CURRENT_EVENTS Unknown_gmf EK - pdfx.html; |
| 13,201 | 2015/01/20 | 2016054 | ET CURRENT_EVENTS Unknown_gmf EK - Server Response - Application Error; |
| 13,200 | 2015/01/20 | 2016053 | ET CURRENT_EVENTS Unknown_gmf EK - Payload Download Received; |
| 13,199 | 2015/01/20 | 2016052 | ET CURRENT_EVENTS Unknown_gmf EK - Payload Download Requested; |
| 13,198 | 2015/01/20 | 2016051 | ET TROJAN W32.Daws/Sanny CnC POST; [1,2] |
| 13,197 | 2015/01/20 | 2016050 | ET TROJAN W32.Daws/Sanny CnC Initial Beacon; [1,2] |
| 13,196 | 2015/01/20 | 2016049 | ET TROJAN W32/Prinimalka Prinimalka.py Script In CnC Beacon; [1] |
| 13,195 | 2015/01/20 | 2016048 | ET TROJAN W32/Prinimalka Configuration Update Request; [1] |
| 13,194 | 2015/01/20 | 2016047 | ET TROJAN W32/Prinimalka Get Task CnC Beacon; [1] |
| 13,193 | 2015/01/20 | 2016046 | ET DELETED SofosFO/NeoSploit possible second stage landing page (2); |
| 13,192 | 2015/01/20 | 2016045 | ET WEB_SPECIFIC_APPS Admidio headline parameter Cross Site Scripting Attempt; [1] |
| 13,191 | 2015/01/20 | 2016044 | ET WEB_SPECIFIC_APPS RIPS function.php Local File Inclusion Vulnerability; [1] |
| 13,190 | 2015/01/20 | 2016043 | ET WEB_SPECIFIC_APPS RIPS code.php Local File Inclusion Vulnerability; [1] |
| 13,189 | 2015/01/20 | 2016042 | ET WEB_SPECIFIC_APPS Manhali download.php Local File Inclusion Vulnerability; [1] |
| 13,188 | 2015/01/20 | 2016041 | ET ACTIVEX Possible NVIDIA Install Application ActiveX Control AddPackages Unicode Buffer Overflow; [1] |
| 13,187 | 2015/01/20 | 2016040 | ET WEB_SPECIFIC_APPS SimpleInvoices having parameter Cross Site Scripting Attempt; [1] |
| 13,186 | 2015/01/20 | 2016039 | ET WEB_SPECIFIC_APPS Havalite userId parameter Cross Site Scripting Attempt; [1] |
| 13,185 | 2015/01/20 | 2016038 | ET WEB_SPECIFIC_APPS WordPress FSML Plugin fsml-hideshow.js.php Remote File Inclusion Attempt; [1] |
| 13,184 | 2015/01/20 | 2016037 | ET WEB_SPECIFIC_APPS WordPress FSML Plugin fsml-admin.js.php Remote File Inclusion Attempt; [1] |
| 13,183 | 2015/01/20 | 2016036 | ET WEB_SPECIFIC_APPS Simplemachines view parameter Cross Site Scripting Attempt; [1] |
| 13,182 | 2015/01/20 | 2016035 | ET CURRENT_EVENTS Possible SibHost PDF Request; |
| 13,181 | 2015/01/20 | 2016034 | ET TROJAN Faked Russian Opera UA without Accept - probable downloader; |
| 13,180 | 2015/01/20 | 2016033 | ET SCAN Simple Slowloris Flooder; [1] |
| 13,179 | 2015/01/20 | 2016032 | ET SCAN JCE Joomla Scanner; |
| 13,178 | 2015/01/20 | 2016031 | ET DOS LOIC GET; |
| 13,177 | 2015/01/20 | 2016030 | ET DOS LOIC POST; |
| 13,176 | 2015/01/20 | 2016029 | ET TROJAN Kelihos.K Executable Download DGA; |
| 13,175 | 2015/01/20 | 2016028 | ET EXPLOIT Metasploit -Java Atomic Exploit Downloaded; |
| 13,174 | 2015/01/20 | 2016027 | ET CURRENT_EVENTS g01pack - Landing Page Received - applet and 32AlphaNum.jar; |
| 13,173 | 2015/01/20 | 2016026 | ET CURRENT_EVENTS NuclearPack - Landing Page Received - applet and 32HexChar.jar; |
| 13,172 | 2015/01/20 | 2016025 | ET DELETED Blackhole - TDS Redirection To Exploit Kit - /head/head1.html; |
| 13,171 | 2015/01/20 | 2016024 | ET CURRENT_EVENTS Blackhole - TDS Redirection To Exploit Kit - Loading; |
| 13,170 | 2015/01/20 | 2016023 | ET CURRENT_EVENTS MALVERTISING FlashPost - POST to *.stats; |
| 13,169 | 2015/01/20 | 2016022 | ET CURRENT_EVENTS MALVERTISING FlashPost - Redirection IFRAME; |
| 13,168 | 2015/01/20 | 2016021 | ET DELETED FakeScan - Payload Download Received; |
| 13,167 | 2015/01/20 | 2016020 | ET DELETED FakeScan - Landing Page - Title - Microsoft Antivirus 2013; |
| 13,166 | 2015/01/20 | 2016019 | ET DELETED Win32.boCheMan-A/Dexter; |
| 13,165 | 2015/01/20 | 2016018 | ET CURRENT_EVENTS Embedded Open Type Font file .eot seeing at Cool Exploit Kit; |
| 13,164 | 2015/01/20 | 2016017 | ET DOS DNS Amplification Attack Outbound; |
| 13,163 | 2015/01/20 | 2016016 | ET DOS DNS Amplification Attack Inbound; |
| 13,162 | 2015/01/20 | 2016015 | ET WEB_SPECIFIC_APPS Nagios XI Network Monitor - OS Command Injection; [1] |
| < 271 272 273 274 275 276 277 278 279 280 > |