| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |  | 1,561 | 2015/01/20 |  2003307  |  ET MALWARE Comet Systems Spyware Cursor DL; [1]  |  | 1,560 | 2015/01/20 |  2003306  |  ET MALWARE 180solutions Spyware (tracked event 2 reporting); [1,2]  |  | 1,559 | 2015/01/20 |  2003305  |  ET DELETED Zango-Hotbar User-Agent (zbu-hb-); [1]  |  | 1,558 | 2015/01/20 |  2003304  |  ET MALWARE Effectivebrands.com Spyware Checkin; [1]  |  | 1,557 | 2015/01/20 |  2003303  |  ET POLICY FTP Login Attempt (non-anonymous); [1]  |  | 1,556 | 2015/01/20 |  2003302  |  ET TROJAN psyBNC IRC Server Connection; [1,2]  |  | 1,555 | 2015/01/20 |  2003298  |  ET MALWARE KMIP.net Spyware; [1,2]  |  | 1,554 | 2015/01/20 |  2003297  |  ET MALWARE Travel Update Spyware; [1]  |  | 1,553 | 2015/01/20 |  2003296  |  ET TROJAN Possible Web-based DDoS-command being issued; [1]  |  | 1,552 | 2015/01/20 |  2003295  |  ET WORM Allaple ICMP Sweep Reply Outbound; [1,2,3]  |  | 1,551 | 2015/01/20 |  2003294  |  ET WORM Allaple ICMP Sweep Ping Inbound; [1,2,3]  |  | 1,550 | 2015/01/20 |  2003293  |  ET WORM Allaple ICMP Sweep Reply Inbound; [1,2,3]  |  | 1,549 | 2015/01/20 |  2003292  |  ET WORM Allaple ICMP Sweep Ping Outbound; [1,2,3]  |  | 1,548 | 2015/01/20 |  2003291  |  ET MALWARE SOCKSv5 Bind Inbound (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,547 | 2015/01/20 |  2003290  |  ET MALWARE SOCKSv5 Bind Inbound (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,546 | 2015/01/20 |  2003289  |  ET MALWARE SOCKSv4 Bind Inbound (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,545 | 2015/01/20 |  2003288  |  ET MALWARE SOCKSv4 Bind Inbound (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,544 | 2015/01/20 |  2003287  |  ET MALWARE SOCKSv5 UDP Proxy Inbound Connect Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,543 | 2015/01/20 |  2003286  |  ET MALWARE SOCKSv5 UDP Proxy Inbound Connect Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,542 | 2015/01/20 |  2003285  |  ET MALWARE SOCKSv5 IPv6 Inbound Connect Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,541 | 2015/01/20 |  2003284  |  ET MALWARE SOCKSv5 IPv6 Inbound Connect Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,540 | 2015/01/20 |  2003281  |  ET MALWARE SOCKSv4 Port 5050 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,539 | 2015/01/20 |  2003280  |  ET MALWARE SOCKSv4 Port 5050 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,538 | 2015/01/20 |  2003279  |  ET MALWARE SOCKSv5 Port 5050 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,537 | 2015/01/20 |  2003278  |  ET MALWARE SOCKSv5 Port 5050 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,536 | 2015/01/20 |  2003277  |  ET MALWARE SOCKSv4 Port 1863 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,535 | 2015/01/20 |  2003276  |  ET MALWARE SOCKSv4 Port 1863 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,534 | 2015/01/20 |  2003275  |  ET MALWARE SOCKSv5 Port 1863 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,533 | 2015/01/20 |  2003274  |  ET MALWARE SOCKSv5 Port 1863 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,532 | 2015/01/20 |  2003273  |  ET MALWARE SOCKSv4 Port 5190 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,531 | 2015/01/20 |  2003272  |  ET MALWARE SOCKSv4 Port 5190 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,530 | 2015/01/20 |  2003271  |  ET MALWARE SOCKSv5 Port 5190 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,529 | 2015/01/20 |  2003270  |  ET MALWARE SOCKSv5 Port 5190 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,528 | 2015/01/20 |  2003269  |  ET MALWARE SOCKSv4 Port 443 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,527 | 2015/01/20 |  2003268  |  ET MALWARE SOCKSv4 Port 443 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,526 | 2015/01/20 |  2003267  |  ET MALWARE SOCKSv5 Port 443 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,525 | 2015/01/20 |  2003266  |  ET MALWARE SOCKSv5 Port 443 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,524 | 2015/01/20 |  2003263  |  ET MALWARE SOCKSv4 HTTP Proxy Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,523 | 2015/01/20 |  2003262  |  ET MALWARE SOCKSv4 HTTP Proxy Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,522 | 2015/01/20 |  2003261  |  ET MALWARE SOCKSv5 HTTP Proxy Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,521 | 2015/01/20 |  2003260  |  ET MALWARE SOCKSv5 HTTP Proxy Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,520 | 2015/01/20 |  2003259  |  ET MALWARE SOCKSv5 DNS Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,519 | 2015/01/20 |  2003258  |  ET MALWARE SOCKSv5 DNS Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,518 | 2015/01/20 |  2003257  |  ET MALWARE SOCKSv5 Port 25 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,517 | 2015/01/20 |  2003256  |  ET MALWARE SOCKSv4 Port 25 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,516 | 2015/01/20 |  2003255  |  ET MALWARE SOCKSv5 Port 25 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9]  |  | 1,515 | 2015/01/20 |  2003254  |  ET MALWARE SOCKSv5 Port 25 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9]  |  | 1,514 | 2015/01/20 |  2003253  |  ET MALWARE MarketScore Spyware Uploading Data; [1,2,3]  |  | 1,513 | 2015/01/20 |  2003251  |  ET MALWARE SpySheriff Intial Phone Home; [1,2]  |  | 1,512 | 2015/01/20 |  2003250  |  ET EXPLOIT Symantec Remote Management RTVScan Exploit; [1,2]  |  | < 511  512  513  514  515  516  517  518  519  520 > |   
         |