|
|
|
번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 8,861 | 2015/01/20 | 2011324 | ET DELETED Games.jar Download Suspicious Possible Exploit Attempt; | 8,860 | 2015/01/20 | 2011312 | ET POLICY hide-my-ip.com POST version check; | 8,859 | 2015/01/20 | 2011311 | ET POLICY request for hide-my-ip.com autoupdate; | 8,858 | 2015/01/20 | 2011307 | ET DELETED DRIVEBY bredolab - hidden div served by nginx; | 8,857 | 2015/01/20 | 2011306 | ET DELETED MALVERTISING request to adfarm.mediaplex.com.* host; | 8,856 | 2015/01/20 | 2011305 | ET DELETED MALVERTISING request to adnet.media.* host; | 8,855 | 2015/01/20 | 2011304 | ET DELETED MALVERTISING request to view.ads.* host; | 8,854 | 2015/01/20 | 2011303 | ET DELETED MALVERTISING request to js.zedo.com.* host; | 8,853 | 2015/01/20 | 2011302 | ET DELETED MALVERTISING request to media.fastclick.net.* host; | 8,852 | 2015/01/20 | 2011300 | ET TROJAN Stuxnet index.php; [1] | 8,851 | 2015/01/20 | 2011297 | ET MALWARE User-Agent (KRMAK) Butterfly Bot download; | 8,850 | 2015/01/20 | 2011296 | ET TROJAN Butterfly/Mariposa Bot Join Acknowledgment; | 8,849 | 2015/01/20 | 2011295 | ET TROJAN Butterfly/Mariposa Bot client init connection; | 8,848 | 2015/01/20 | 2011294 | ET TROJAN Trojan.Win32.FraudPack.aweo; [1] | 8,847 | 2015/01/20 | 2011293 | ET MALWARE Suspicious User Agent (GabPath); | 8,846 | 2015/01/20 | 2011291 | ET WEB_SERVER Asprox Spambot SQL-Injection Atempt; | 8,845 | 2015/01/20 | 2011290 | ET WEB_SERVER Gootkit Website Infection Request for FTP Credentials from Control Server; [1,2,3] | 8,844 | 2015/01/20 | 2011289 | ET WEB_SERVER Local Website Infected By Gootkit; [1,2,3] | 8,843 | 2015/01/20 | 2011287 | ET WEB_SERVER Gootkit Website Infection Receiving FTP Credentials from Control Server; [1,2,3] | 8,842 | 2015/01/20 | 2011286 | ET WEB_SERVER Bot Search RFI Scan (Casper-Like MaMa Cyber/ebes); [1,2] | 8,841 | 2015/01/20 | 2011285 | ET WEB_SERVER Bot Search RFI Scan (Casper-Like, Jcomers Bot scan); [1,2] | 8,840 | 2015/01/20 | 2011283 | ET MALWARE User-Agent (TALWinInetHTTPClient); | 8,839 | 2015/01/20 | 2011282 | ET USER_AGENTS Suspicious User Agent (ScrapeBox); | 8,838 | 2015/01/20 | 2011281 | ET WEB_CLIENT phoenix exploit kit - admin login page detected; | 8,837 | 2015/01/20 | 2011280 | ET WEB_SERVER Phoenix Exploit Kit - Admin Login Page Detected Outbound; | 8,836 | 2015/01/20 | 2011279 | ET MALWARE User-Agent (browserbob.com); | 8,835 | 2015/01/20 | 2011278 | ET TROJAN Trojan.Win32.Cosmu.xet; [1] | 8,834 | 2015/01/20 | 2011277 | ET TROJAN Rogue.Win32/Winwebsec Checkin; [1] | 8,833 | 2015/01/20 | 2011276 | ET TROJAN Suspicious User-Agent (InfoBot); [1] | 8,832 | 2015/01/20 | 2011275 | ET DELETED Akamai Redswoosh CLIOnlineManager Connection Detected; [1] | 8,831 | 2015/01/20 | 2011274 | ET WEB_SPECIFIC_APPS OpenX phpAdsNew phpAds_geoPlugin Parameter Remote File Inclusion Attempt; [1,2,3] | 8,830 | 2015/01/20 | 2011273 | ET DELETED User-Agent (GM Login); [1] | 8,829 | 2015/01/20 | 2011272 | ET TROJAN Win32/Chekafe.A or Related Infection Checkin; [1,2] | 8,828 | 2015/01/20 | 2011271 | ET MALWARE User-Agent (CustomSpy); [1] | 8,827 | 2015/01/20 | 2011270 | ET DELETED Possible Microsoft Windows .lnk File Processing WebDAV Arbitrary Code Execution Attempt; [1,2,3] | 8,826 | 2015/01/20 | 2011269 | ET TROJAN Downloader.Win32.Small; [1] | 8,825 | 2015/01/20 | 2011268 | ET WEB_SPECIFIC_APPS Oracle Business Process Management context Parameter Cross Site Scripting Attempt; [1,2,3] | 8,824 | 2015/01/20 | 2011266 | ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter UPDATE SET SQL Injection Attempt; [1,2,3] | 8,823 | 2015/01/20 | 2011265 | ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter INSERT INTO SQL Injection Attempt; [1,2,3] | 8,822 | 2015/01/20 | 2011264 | ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter UNION SELECT SQL Injection Attempt; [1,2,3] | 8,821 | 2015/01/20 | 2011263 | ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter DELETE FROM SQL Injection Attempt; [1,2,3] | 8,820 | 2015/01/20 | 2011262 | ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter SELECT FROM SQL Injection Attempt; [1,2,3] | 8,819 | 2015/01/20 | 2011259 | ET WEB_SPECIFIC_APPS MAXcms fm_includes_special Parameter Remote File Inclusion Attempt; [1,2,3] | 8,818 | 2015/01/20 | 2011258 | ET WEB_SPECIFIC_APPS FireStats window-new-edit-site.php Cross Site Scripting Attempt; [1,2,3] | 8,817 | 2015/01/20 | 2011257 | ET WEB_SPECIFIC_APPS FireStats window-add-excluded-url.php Cross Site Scripting Attempt; [1,2,3] | 8,816 | 2015/01/20 | 2011256 | ET WEB_SPECIFIC_APPS FireStats window-add-excluded-ip.php Cross Site Scripting Attempt; [1,2,3] | 8,815 | 2015/01/20 | 2011255 | ET WEB_SPECIFIC_APPS Redaxo CMS specials.inc.php Remote File Inclusion Attempt; [1,2,3] | 8,814 | 2015/01/20 | 2011254 | ET WEB_SPECIFIC_APPS Redaxo CMS index.inc.php Remote File Inclusion Attempt; [1,2,3] | 8,813 | 2015/01/20 | 2011253 | ET ACTIVEX Registry OCX ActiveX FullPath Method Buffer Overflow Attempt; [1,2] | 8,812 | 2015/01/20 | 2011252 | ET DELETED FathFTP ActiveX Control RasIsConnected Method Buffer Overflow Attempt; [1,2] | < 361 362 363 364 365 366 367 368 369 370 > |
|
Copyright ⓒ 2010 . All Rights Reserved.
|
|