|  
	
		| 
			
		 | 
	 
	 |  
    
        
            | 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |  | 1,411 | 2015/01/20 |  2003105  |  ET ACTIVEX Microsoft Multimedia Controls - ActiveX control's KeyFrame function call Object; [1,2]  |  | 1,410 | 2015/01/20 |  2003104  |  ET DELETED Microsoft Multimedia Controls - ActiveX control's KeyFrame function call CSLID; [1,2]  |  | 1,409 | 2015/01/20 |  2003103  |  ET ACTIVEX Microsoft Multimedia Controls - ActiveX control's spline function call Object; [1,2]  |  | 1,408 | 2015/01/20 |  2003102  |  ET ACTIVEX Microsoft Multimedia Controls - ActiveX control's spline function call CLSID; [1,2]  |  | 1,407 | 2015/01/20 |  2003099  |  ET WEB_SERVER Poison Null Byte; [1,2]  |  | 1,406 | 2015/01/20 |  2003097  |  ET DELETED Possible Image Spam Inbound (complex rule); [1]  |  | 1,405 | 2015/01/20 |  2003096  |  ET DELETED Possible Image Spam Inbound (simple rule); [1]  |  | 1,404 | 2015/01/20 |  2003095  |  ET DELETED (UPX) VMM Detecting Torpig/Anserin/Sinowal Trojan; [1]  |  | 1,403 | 2015/01/20 |  2003094  |  ET DELETED VMM Detecting Torpig/Anserin/Sinowal Trojan; [1]  |  | 1,402 | 2015/01/20 |  2003092  |  ET DELETED Gmail gtalk; [1]  |  | 1,401 | 2015/01/20 |  2003089  |  ET GAMES STEAM Connection (v2); [1]  |  | 1,400 | 2015/01/20 |  2003087  |  ET WEB_SERVER Barracuda Spam Firewall preview_email.cgi Remote Directory Traversal Attempt; [1]  |  | 1,399 | 2015/01/20 |  2003086  |  ET WEB_SERVER Barracuda Spam Firewall preview_email.cgi Remote Command Execution; [1]  |  | 1,398 | 2015/01/20 |  2003085  |  ET WEB_SPECIFIC_APPS TWiki Configure Script TYPEOF Remote Command Execution Attempt; [1]  |  | 1,397 | 2015/01/20 |  2003084  |  ET MALWARE TROJAN_VB Microjoin; [1,2]  |  | 1,396 | 2015/01/20 |  2003083  |  ET TROJAN Dialer; [1,2]  |  | 1,395 | 2015/01/20 |  2003082  |  ET NETBIOS NETBIOS SMB-DS DCERPC NetrpPathCanonicalize request (possible MS06-040); [1,2]  |  | 1,394 | 2015/01/20 |  2003081  |  ET NETBIOS NETBIOS SMB DCERPC NetrpPathCanonicalize request (possible MS06-040); [1,2]  |  | 1,393 | 2015/01/20 |  2003076  |  ET MALWARE Content-loader.com (ownusa.info) Spyware Install; [1]  |  | 1,392 | 2015/01/20 |  2003075  |  ET MALWARE Content-loader.com Spyware Install 2; [1]  |  | 1,391 | 2015/01/20 |  2003074  |  ET MALWARE Content-loader.com Spyware Install; [1]  |  | 1,390 | 2015/01/20 |  2003073  |  ET DELETED ICMP Banking Trojan sending encrypted stolen data; [1,2]  |  | 1,389 | 2015/01/20 |  2003072  |  ET EXPLOIT Linksys WRT54g Authentication Bypass Attempt; [1,2]  |  | 1,388 | 2015/01/20 |  2003071  |  ET ATTACK_RESPONSE Possible /etc/passwd via HTTP (BSD style); [1]  |  | 1,387 | 2015/01/20 |  2003070  |  ET DELETED Korgo.U Reporting; [1,2]  |  | 1,386 | 2015/01/20 |  2003069  |  ET DELETED Anonymous Proxy Traffic from Inside; [1]  |  | 1,385 | 2015/01/20 |  2003068  |  ET SCAN Potential SSH Scan OUTBOUND; [1,2]  |  | 1,384 | 2015/01/20 |  2003067  |  ET EXPLOIT DOS Microsoft Windows SRV.SYS MAILSLOT; [1,2,3]  |  | 1,383 | 2015/01/20 |  2003066  |  ET TROJAN Torpig Reporting User Activity (wur8); [1,2]  |  | 1,382 | 2015/01/20 |  2003065  |  ET DELETED Cisco-MARS/JBoss Remote Command Execution; [1]  |  | 1,381 | 2015/01/20 |  2003064  |  ET DELETED Cisco-MARS/JBoss jmx-console POST; [1]  |  | 1,380 | 2015/01/20 |  2003063  |  ET DELETED WebAttacker RootLauncher; [1]  |  | 1,379 | 2015/01/20 |  2003062  |  ET USER_AGENTS 180 Solutions (Zango Installer) User Agent; [1]  |  | 1,378 | 2015/01/20 |  2003061  |  ET MALWARE 180solutions (Zango) Spyware Event Activity Post; [1,2]  |  | 1,377 | 2015/01/20 |  2003060  |  ET MALWARE 180solutions (Zango) Spyware Local Stats Post; [1,2]  |  | 1,376 | 2015/01/20 |  2003059  |  ET MALWARE 180solutions (Zango) Spyware TB Installer Download; [1,2]  |  | 1,375 | 2015/01/20 |  2003058  |  ET MALWARE 180solutions (Zango) Spyware Installer Download; [1,2]  |  | 1,374 | 2015/01/20 |  2003057  |  ET MALWARE 180solutions Spyware Actionlibs Download; [1,2]  |  | 1,373 | 2015/01/20 |  2003056  |  ET WEB_SPECIFIC_APPS EiQNetworks Security Analyzer Buffer Overflow; [1,2]  |  | 1,372 | 2015/01/20 |  2003055  |  ET MALWARE Suspicious FTP 220 Banner on Local Port (-); [1]  |  | 1,371 | 2015/01/20 |  2003048  |  ET POLICY Proxy Judge Discovery/Evasion (proxyjudge.cgi); [1]  |  | 1,370 | 2015/01/20 |  2003047  |  ET POLICY Proxy Judge Discovery/Evasion (prxjdg.cgi); [1]  |  | 1,369 | 2015/01/20 |  2003046  |  ET DELETED Real.com Game Arcade Install; [1]  |  | 1,368 | 2015/01/20 |  2003045  |  ET DELETED Real.com Game Arcade Install (User agent); [1]  |  | 1,367 | 2015/01/20 |  2003041  |  ET DELETED Win32.SMTP-Mailer SMTP Outbound; [1,2,3]  |  | 1,366 | 2015/01/20 |  2003040  |  ET DELETED PCMesh Anonymous Proxy client connect; [1]  |  | 1,365 | 2015/01/20 |  2003039  |  ET EXPLOIT UPnP DLink M-Search Overflow Attempt; [1,2]  |  | 1,364 | 2015/01/20 |  2003038  |  ET POLICY Known SSL traffic on port 8294 (Bloomberg) being excluded from SSL Alerts; [1]  |  | 1,363 | 2015/01/20 |  2003037  |  ET POLICY Known SSL traffic on port 8292 (Bloomberg) being excluded from SSL Alerts; [1]  |  | 1,362 | 2015/01/20 |  2003036  |  ET POLICY Known SSL traffic on port 8080 (proxy) being excluded from SSL Alerts; [1]  |  | < 511  512  513  514  515  516  517  518  519  520 > |   
         | 
     
 
 
								 
								Copyright ⓒ 2010  . All Rights Reserved.  
							 | 
							
								 |