번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 9,161 | 2015/01/20 | 2011792 | ET DELETED Shiz/Rohimafo Proxy Registration; [1,2,3,4,5] | 9,160 | 2015/01/20 | 2011791 | ET TROJAN Shiz/Rohimafo Checkin; [1,2,3,4,5,6] | 9,159 | 2015/01/20 | 2011769 | ET TROJAN Shiz/Rohimafo Binary Download Request; [1,2,3,4,5,6] | 9,158 | 2015/01/20 | 2011768 | ET WEB_SERVER PHP tags in HTTP POST; [1] | 9,157 | 2015/01/20 | 2011767 | ET TROJAN Avzhan DDOS Bot Inbound Hardcoded Malformed GET Request Denial Of Service Attack Detected; [1] | 9,156 | 2015/01/20 | 2011766 | ET SCAN Modified Sipvicious User-Agent Detected (sundayddr); [1,2,3,4] | 9,155 | 2015/01/20 | 2011765 | ET POLICY eval(function(p a c k e d) JavaScript from nginx Detected - Likely Hostile; [1] | 9,154 | 2015/01/20 | 2011764 | ET WEB_CLIENT Possible Microsoft Internet Explorer mshtml.dll Timer ID Memory Pointer Information Disclosure Attempt; [1,2,3] | 9,153 | 2015/01/20 | 2011763 | ET WEB_SERVER Possible Cisco PIX/ASA HTTP Web Interface HTTP Response Splitting Attempt; [1,2,3] | 9,152 | 2015/01/20 | 2011761 | ET DOS Possible MySQL ALTER DATABASE Denial Of Service Attempt; [1,2,3] | 9,151 | 2015/01/20 | 2011760 | ET DELETED Likely FAKEAV scanner page encountered - i1000000.gif; [1] | 9,150 | 2015/01/20 | 2011759 | ET WEB_SERVER TIEHTTP User-Agent; [1] | 9,149 | 2015/01/20 | 2011758 | ET GAMES TrackMania Ad Report; [1,2] | 9,148 | 2015/01/20 | 2011757 | ET GAMES TrackMania Request LiveUpdate; [1,2] | 9,147 | 2015/01/20 | 2011756 | ET GAMES TrackMania Request SearchNew; [1,2] | 9,146 | 2015/01/20 | 2011755 | ET GAMES TrackMania Request GetBuddies; [1,2] | 9,145 | 2015/01/20 | 2011754 | ET GAMES TrackMania Request GetOnlineProfile; [1,2] | 9,144 | 2015/01/20 | 2011753 | ET GAMES TrackMania Request Disconnect; [1,2] | 9,143 | 2015/01/20 | 2011752 | ET GAMES TrackMania Request Connect; [1,2] | 9,142 | 2015/01/20 | 2011751 | ET GAMES TrackMania Request OpenSession; [1,2] | 9,141 | 2015/01/20 | 2011750 | ET GAMES TrackMania Request GetConnectionAndGameParams; [1,2] | 9,140 | 2015/01/20 | 2011749 | ET GAMES TrackMania Game Check for Patch; [1,2] | 9,139 | 2015/01/20 | 2011748 | ET GAMES TrackMania Game Launch; [1,2] | 9,138 | 2015/01/20 | 2011747 | ET GAMES TeamSpeak2 ACK; [1,2] | 9,137 | 2015/01/20 | 2011746 | ET GAMES TeamSpeak2 Standard/Disconnect; [1,2] | 9,136 | 2015/01/20 | 2011745 | ET GAMES TeamSpeak2 Standard/Known Player Update; [1,2] | 9,135 | 2015/01/20 | 2011744 | ET GAMES TeamSpeak2 Standard/Change Status; [1,2] | 9,134 | 2015/01/20 | 2011743 | ET GAMES TeamSpeak2 Standard/Player Left; [1,2] | 9,133 | 2015/01/20 | 2011742 | ET GAMES TeamSpeak2 Standard/New Player Joined; [1,2] | 9,132 | 2015/01/20 | 2011741 | ET GAMES TeamSpeak2 Standard/Login End; [1,2] | 9,131 | 2015/01/20 | 2011740 | ET GAMES TeamSpeak2 Standard/Player List; [1,2] | 9,130 | 2015/01/20 | 2011739 | ET GAMES TeamSpeak2 Standard/Channel List; [1,2] | 9,129 | 2015/01/20 | 2011738 | ET GAMES TeamSpeak2 Standard/Login Part 2; [1,2] | 9,128 | 2015/01/20 | 2011737 | ET GAMES TeamSpeak2 Connection/Ping Reply; [1,2] | 9,127 | 2015/01/20 | 2011736 | ET GAMES TeamSpeak2 Connection/Ping; [1,2] | 9,126 | 2015/01/20 | 2011735 | ET GAMES TeamSpeak2 Connection/Login Replay; [1,2] | 9,125 | 2015/01/20 | 2011734 | ET GAMES TeamSpeak2 Connection/Login; [1,2] | 9,124 | 2015/01/20 | 2011733 | ET GAMES TeamSpeak3 Connect; [1,2] | 9,123 | 2015/01/20 | 2011732 | ET DOS Possible VNC ClientCutText Message Denial of Service/Memory Corruption Attempt; [1,2] | 9,122 | 2015/01/20 | 2011731 | ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter Cross Site Scripting Attempt; [1,2] | 9,121 | 2015/01/20 | 2011730 | ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter UPDATE SET SQL Injection Attempt; [1,2] | 9,120 | 2015/01/20 | 2011729 | ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter INSERT INTO SQL Injection Attempt; [1,2] | 9,119 | 2015/01/20 | 2011728 | ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter UNION SELECT SQL Injection Attempt; [1,2] | 9,118 | 2015/01/20 | 2011727 | ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter DELETE FROM SQL Injection Attempt; [1,2] | 9,117 | 2015/01/20 | 2011726 | ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter SELECT FROM SQL Injection Attempt; [1,2] | 9,116 | 2015/01/20 | 2011725 | ET WEB_SPECIFIC_APPS EZPX photoblog tpl_base_dir Parameter Remote File Inclusion Attempt; [1,2,3] | 9,115 | 2015/01/20 | 2011724 | ET WEB_SPECIFIC_APPS Webmoney Advisor ActiveX Control DoS Function Call; [1,2] | 9,114 | 2015/01/20 | 2011723 | ET WEB_SPECIFIC_APPS Webmoney Advisor ActiveX Redirect Method Remote DoS Attempt; [1,2] | 9,113 | 2015/01/20 | 2011722 | ET ACTIVEX Axis Media Controller ActiveX SetImage Method Remote Code Execution Attempt; [1] | 9,112 | 2015/01/20 | 2011721 | ET SCAN Possible Fast-Track Tool Spidering User-Agent Detected; [1,2] | < 351 352 353 354 355 356 357 358 359 360 > |
|