시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
1,5612015/01/20 2003307  ET MALWARE Comet Systems Spyware Cursor DL; [1
1,5602015/01/20 2003306  ET MALWARE 180solutions Spyware (tracked event 2 reporting); [1,2
1,5592015/01/20 2003305  ET DELETED Zango-Hotbar User-Agent (zbu-hb-); [1
1,5582015/01/20 2003304  ET MALWARE Effectivebrands.com Spyware Checkin; [1
1,5572015/01/20 2003303  ET POLICY FTP Login Attempt (non-anonymous); [1
1,5562015/01/20 2003302  ET TROJAN psyBNC IRC Server Connection; [1,2
1,5552015/01/20 2003298  ET MALWARE KMIP.net Spyware; [1,2
1,5542015/01/20 2003297  ET MALWARE Travel Update Spyware; [1
1,5532015/01/20 2003296  ET TROJAN Possible Web-based DDoS-command being issued; [1
1,5522015/01/20 2003295  ET WORM Allaple ICMP Sweep Reply Outbound; [1,2,3
1,5512015/01/20 2003294  ET WORM Allaple ICMP Sweep Ping Inbound; [1,2,3
1,5502015/01/20 2003293  ET WORM Allaple ICMP Sweep Reply Inbound; [1,2,3
1,5492015/01/20 2003292  ET WORM Allaple ICMP Sweep Ping Outbound; [1,2,3
1,5482015/01/20 2003291  ET MALWARE SOCKSv5 Bind Inbound (Windows Source); [1,2,3,4,5,6,7,8,9
1,5472015/01/20 2003290  ET MALWARE SOCKSv5 Bind Inbound (Linux Source); [1,2,3,4,5,6,7,8,9
1,5462015/01/20 2003289  ET MALWARE SOCKSv4 Bind Inbound (Linux Source); [1,2,3,4,5,6,7,8,9
1,5452015/01/20 2003288  ET MALWARE SOCKSv4 Bind Inbound (Windows Source); [1,2,3,4,5,6,7,8,9
1,5442015/01/20 2003287  ET MALWARE SOCKSv5 UDP Proxy Inbound Connect Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5432015/01/20 2003286  ET MALWARE SOCKSv5 UDP Proxy Inbound Connect Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5422015/01/20 2003285  ET MALWARE SOCKSv5 IPv6 Inbound Connect Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5412015/01/20 2003284  ET MALWARE SOCKSv5 IPv6 Inbound Connect Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5402015/01/20 2003281  ET MALWARE SOCKSv4 Port 5050 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5392015/01/20 2003280  ET MALWARE SOCKSv4 Port 5050 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5382015/01/20 2003279  ET MALWARE SOCKSv5 Port 5050 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5372015/01/20 2003278  ET MALWARE SOCKSv5 Port 5050 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5362015/01/20 2003277  ET MALWARE SOCKSv4 Port 1863 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5352015/01/20 2003276  ET MALWARE SOCKSv4 Port 1863 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5342015/01/20 2003275  ET MALWARE SOCKSv5 Port 1863 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5332015/01/20 2003274  ET MALWARE SOCKSv5 Port 1863 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5322015/01/20 2003273  ET MALWARE SOCKSv4 Port 5190 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5312015/01/20 2003272  ET MALWARE SOCKSv4 Port 5190 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5302015/01/20 2003271  ET MALWARE SOCKSv5 Port 5190 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5292015/01/20 2003270  ET MALWARE SOCKSv5 Port 5190 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5282015/01/20 2003269  ET MALWARE SOCKSv4 Port 443 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5272015/01/20 2003268  ET MALWARE SOCKSv4 Port 443 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5262015/01/20 2003267  ET MALWARE SOCKSv5 Port 443 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5252015/01/20 2003266  ET MALWARE SOCKSv5 Port 443 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5242015/01/20 2003263  ET MALWARE SOCKSv4 HTTP Proxy Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5232015/01/20 2003262  ET MALWARE SOCKSv4 HTTP Proxy Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5222015/01/20 2003261  ET MALWARE SOCKSv5 HTTP Proxy Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5212015/01/20 2003260  ET MALWARE SOCKSv5 HTTP Proxy Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5202015/01/20 2003259  ET MALWARE SOCKSv5 DNS Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5192015/01/20 2003258  ET MALWARE SOCKSv5 DNS Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5182015/01/20 2003257  ET MALWARE SOCKSv5 Port 25 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5172015/01/20 2003256  ET MALWARE SOCKSv4 Port 25 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5162015/01/20 2003255  ET MALWARE SOCKSv5 Port 25 Inbound Request (Linux Source); [1,2,3,4,5,6,7,8,9
1,5152015/01/20 2003254  ET MALWARE SOCKSv5 Port 25 Inbound Request (Windows Source); [1,2,3,4,5,6,7,8,9
1,5142015/01/20 2003253  ET MALWARE MarketScore Spyware Uploading Data; [1,2,3
1,5132015/01/20 2003251  ET MALWARE SpySheriff Intial Phone Home; [1,2
1,5122015/01/20 2003250  ET EXPLOIT Symantec Remote Management RTVScan Exploit; [1,2
< 511  512  513  514  515  516  517  518  519  520 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.