|
|
|
번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 9,111 | 2015/01/20 | 2011720 | ET SCAN Possible WafWoof Web Application Firewall Detection Scan; [1,2] | 9,110 | 2015/01/20 | 2011719 | ET POLICY Win32/Sogou User-Agent (SOGOU_UPDATER); [1,2] | 9,109 | 2015/01/20 | 2011718 | ET MALWARE User-Agent (RangeCheck/0.1); [1] | 9,108 | 2015/01/20 | 2011716 | ET SCAN Sipvicious User-Agent Detected (friendly-scanner); [1,2,3] | 9,107 | 2015/01/20 | 2011715 | ET DELETED MALVERTISING Adobe Exploited Check-In; [1] | 9,106 | 2015/01/20 | 2011714 | ET DELETED Hidden iframe Served by nginx - Likely Hostile Code; [1] | 9,105 | 2015/01/20 | 2011713 | ET P2P Bittorrent P2P Client User-Agent (BTSP); [1] | 9,104 | 2015/01/20 | 2011712 | ET P2P Bittorrent P2P Client User-Agent (FDM 3.x); [1,2] | 9,103 | 2015/01/20 | 2011711 | ET P2P Bittorrent P2P Client User-Agent (KTorrent 2.x); [1,2] | 9,102 | 2015/01/20 | 2011710 | ET P2P Bittorrent P2P Client User-Agent (BitComet); [1,2] | 9,101 | 2015/01/20 | 2011708 | ET GAMES Blizzard Downloader Client User-Agent (Blizzard Downloader 2.x); [1,2] | 9,100 | 2015/01/20 | 2011707 | ET P2P Client User-Agent (Shareaza 2.x); [1,2] | 9,099 | 2015/01/20 | 2011706 | ET P2P Bittorrent P2P Client User-Agent (uTorrent); [1,2] | 9,098 | 2015/01/20 | 2011705 | ET P2P Bittorrent P2P Client User-Agent (rTorrent); [1,2] | 9,097 | 2015/01/20 | 2011704 | ET P2P Bittorrent P2P Client User-Agent (Deluge 1.x.x); [1,2] | 9,096 | 2015/01/20 | 2011703 | ET P2P Bittorrent P2P Client User-Agent (Enhanced CTorrent 3.x); [1,2] | 9,095 | 2015/01/20 | 2011702 | ET P2P Bittorrent P2P Client User-Agent (BitTornado); [1,2] | 9,094 | 2015/01/20 | 2011701 | ET P2P Bittorrent P2P Client User-Agent (Opera/10.x); [1,2] | 9,093 | 2015/01/20 | 2011700 | ET P2P Bittorrent P2P Client User-Agent (KTorrent/3.x.x); [1,2] | 9,092 | 2015/01/20 | 2011699 | ET P2P Bittorrent P2P Client User-Agent (Transmission/1.x); [1,2] | 9,091 | 2015/01/20 | 2011698 | ET WEB_CLIENT Java Web Start Command Injection (.jar); [1,2] | 9,090 | 2015/01/20 | 2011697 | ET WEB_SPECIFIC_APPS JBoss JMX Console Beanshell Deployer .WAR File Upload and Deployment Cross Site Request Forgery Attempt; [1,2] | 9,089 | 2015/01/20 | 2011696 | ET WEB_SPECIFIC_APPS Possible JBoss JMX Console Beanshell Deployer WAR Upload and Deployment Exploit Attempt; [1,2] | 9,088 | 2015/01/20 | 2011695 | ET WEB_CLIENT Possible Microsoft Internet Explorer Dynamic Object Tag/URLMON Sniffing Cross Domain Information Disclosure Attempt; [1,2,3,4,5] | 9,087 | 2015/01/20 | 2011694 | ET POLICY Windows 3.1 User-Agent Detected - Possible Malware or Non-Updated System; [1] | 9,086 | 2015/01/20 | 2011693 | ET TROJAN Fragus Exploit Kit Landing; [1,2,3] | 9,085 | 2015/01/20 | 2011692 | ET ACTIVEX Avaya CallPilot Unified Messaging ActiveX InstallFrom Method Access Attempt; [1,2] | 9,084 | 2015/01/20 | 2011691 | ET MALWARE Hotbar Agent User-Agent (PinballCorp); [1] | 9,083 | 2015/01/20 | 2011690 | ET ACTIVEX Possible Sygate Personal Firewall ActiveX SetRegString Method Stack Overflow Attempt; [1,2,3] | 9,082 | 2015/01/20 | 2011681 | ET ACTIVEX Avaya CallPilot Unified Messaging ActiveX Function Call; [1,2] | 9,081 | 2015/01/20 | 2011680 | ET DELETED Skype Easybits Extras Manager - Exploit; [1,2] | 9,080 | 2015/01/20 | 2011679 | ET MALWARE User-Agent (dbcount); [1] | 9,079 | 2015/01/20 | 2011678 | ET MALWARE User-Agent (HTTP_Query); [1] | 9,078 | 2015/01/20 | 2011677 | ET MALWARE MSIL.Amiricil.gen HTTP Checkin; [1,2] | 9,077 | 2015/01/20 | 2011676 | ET WEB_SPECIFIC_APPS Cisco Collaboration Server LoginPage.jhtml Cross Site Scripting Attempt; [1,2] | 9,076 | 2015/01/20 | 2011675 | ET ACTIVEX Possible NOS Microsystems Adobe Reader/Acrobat getPlus Get_atlcom Helper ActiveX Control Multiple Stack Overflows Remote Code Execution Attempt; [1,2,3,4,5] | 9,075 | 2015/01/20 | 2011674 | ET DOS SolarWinds TFTP Server Long Write Request Denial Of Service Attempt; [1,2] | 9,074 | 2015/01/20 | 2011673 | ET DOS Possible SolarWinds TFTP Server Read Request Denial Of Service Attempt; [1,2] | 9,073 | 2015/01/20 | 2011672 | ET DELETED Adobe Flash 0Day Exploit Attempt; [1,2] | 9,072 | 2015/01/20 | 2011670 | ET DELETED Fake AV Related CSS Download; [1] | 9,071 | 2015/01/20 | 2011669 | ET EXPLOIT Linksys WAP54G debug.cgi Shell Access as Gemtek; [1,2] | 9,070 | 2015/01/20 | 2011668 | ET ATTACK_RESPONSE Backdoor reDuh http tunnel; [1,2] | 9,069 | 2015/01/20 | 2011667 | ET ATTACK_RESPONSE Backdoor reDuh http initiate; [1,2] | 9,068 | 2015/01/20 | 2011666 | ET WEB_SPECIFIC_APPS 29o3 CMS layoutManager.php LibDir Parameter Remote File Inclusion Attempt; [1,2] | 9,067 | 2015/01/20 | 2011592 | ET TROJAN Yoyo-DDoS Bot Download and Launch Executable Message From CnC Server; [1] | 9,066 | 2015/01/20 | 2011591 | ET TROJAN Potential-Hiloti/FakeAV site access; | 9,065 | 2015/01/20 | 2011590 | ET ACTIVEX Microsoft DirectX 9 ActiveX Control Format String Function Call; [1] | 9,064 | 2015/01/20 | 2011589 | ET ACTIVEX Microsoft DirectX 9 msvidctl.dll ActiveX Control Code Execution Attempt; [1] | 9,063 | 2015/01/20 | 2011588 | ET TROJAN Zeus Bot Request to CnC; [1,2] | 9,062 | 2015/01/20 | 2011585 | ET TROJAN Avzhan DDOS Bot Outbound Hardcoded Malformed GET Request Denial Of Service Attack Detected; [1] | < 361 362 363 364 365 366 367 368 369 370 > |
|
Copyright ⓒ 2010 . All Rights Reserved.
|
|