번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
10,811 | 2015/01/20 | 2013489 | ET TROJAN Best Pack Exploit Pack Binary Load Request; [1] |
10,810 | 2015/01/20 | 2013488 | ET TROJAN Zeus Bot GET to Bing checking Internet connectivity; [1,2] |
10,809 | 2015/01/20 | 2013487 | ET CURRENT_EVENTS Likely Generic Java Exploit Attempt Request for Java to decimal host; [1] |
10,808 | 2015/01/20 | 2013486 | ET CURRENT_EVENTS Phoenix landing page JAVASMB; |
10,807 | 2015/01/20 | 2013485 | ET CURRENT_EVENTS Phoenix Java MIDI Exploit Received; |
10,806 | 2015/01/20 | 2013484 | ET CURRENT_EVENTS Phoenix Java MIDI Exploit Received By Vulnerable Client; |
10,805 | 2015/01/20 | 2013483 | ET TROJAN DNS query for Morto RDP worm related domain jifr.co.cc; [1] |
10,804 | 2015/01/20 | 2013482 | ET TROJAN DNS query for Morto RDP worm related domain jaifr.net; [1] |
10,803 | 2015/01/20 | 2013481 | ET TROJAN DNS query for Morto RDP worm related domain jaifr.com; [1] |
10,802 | 2015/01/20 | 2013480 | ET TROJAN DNS query for Morto RDP worm related domain qfsl.net; [1] |
10,801 | 2015/01/20 | 2013479 | ET SCAN Behavioral Unusually fast Terminal Server Traffic, Potential Scan or Infection (Outbound); [1] |
10,800 | 2015/01/20 | 2013478 | ET POLICY SUSPICIOUS *.pdf.exe in HTTP HEADER; |
10,799 | 2015/01/20 | 2013477 | ET POLICY SUSPICIOUS *.doc.exe in HTTP HEADER; |
10,798 | 2015/01/20 | 2013476 | ET POLICY SUSPICIOUS *.pdf.exe in HTTP URL; |
10,797 | 2015/01/20 | 2013475 | ET POLICY SUSPICIOUS *.doc.exe in HTTP URL; |
10,796 | 2015/01/20 | 2013474 | ET CURRENT_EVENTS DRIVEBY ACH - Redirection; |
10,795 | 2015/01/20 | 2013473 | ET SCAN Apache mod_deflate DoS via many multiple byte Range values; [1] |
10,794 | 2015/01/20 | 2013472 | ET SCAN Kingcope KillApache.pl Apache mod_deflate DoS attempt; [1] |
10,793 | 2015/01/20 | 2013471 | ET WEB_SPECIFIC_APPS Joomla Community component userid parameter UPDATE SET SQL Injection Attempt; [1] |
10,792 | 2015/01/20 | 2013470 | ET WEB_SPECIFIC_APPS Joomla Community component userid parameter INSERT INTO SQL Injection Attempt; [1] |
10,791 | 2015/01/20 | 2013469 | ET WEB_SPECIFIC_APPS Joomla Community component userid parameter UNION SELECT SQL Injection Attempt; [1] |
10,790 | 2015/01/20 | 2013468 | ET WEB_SPECIFIC_APPS Joomla Community component userid parameter DELETE FROM SQL Injection Attempt; [1] |
10,789 | 2015/01/20 | 2013467 | ET WEB_SPECIFIC_APPS Joomla Community component userid parameter SELECT FROM SQL Injection Attempt; [1] |
10,788 | 2015/01/20 | 2013466 | ET WEB_SPECIFIC_APPS DiY-CMS lang Parameter Remote File inclusion Attempt; [1] |
10,787 | 2015/01/20 | 2013465 | ET WEB_SPECIFIC_APPS EasySiteEdit langval Parameter Remote File inclusion Attempt; [1] |
10,786 | 2015/01/20 | 2013464 | ET WEB_SPECIFIC_APPS WordPress UnGallery pic Parameter Local File Inclusion Attempt; [1] |
10,785 | 2015/01/20 | 2013463 | ET DOS Skype FindCountriesByNamePattern property Buffer Overflow Attempt Format String Function Call; [1] |
10,784 | 2015/01/20 | 2013462 | ET DOS Skype FindCountriesByNamePattern property Buffer Overflow Attempt; [1] |
10,783 | 2015/01/20 | 2013461 | ET TROJAN Win32/Wizpop Initial Checkin; [1] |
10,782 | 2015/01/20 | 2013460 | ET INFO HTTP Request to a *.c0m.li domain; |
10,781 | 2015/01/20 | 2013459 | ET POLICY Facebook Like Button Clicked (2); [1,2] |
10,780 | 2015/01/20 | 2013458 | ET POLICY Facebook Like Button Clicked (1); [1,2] |
10,779 | 2015/01/20 | 2013457 | ET POLICY BitCoin User-Agent Likely Bitcoin Miner; [1] |
10,778 | 2015/01/20 | 2013456 | ET TROJAN Win32/VB.HV Checkin; [1] |
10,777 | 2015/01/20 | 2013455 | ET TROJAN Suspicious User-Agent (GUIDTracker); [1] |
10,776 | 2015/01/20 | 2013454 | ET POLICY CNET TechTracker Software Manager request; [1] |
10,775 | 2015/01/20 | 2013453 | ET POLICY CNET Custom Installer Possible Bundled Bloatware; [1] |
10,774 | 2015/01/20 | 2013452 | ET MALWARE Suspicious User-Agent (go-diva); [1] |
10,773 | 2015/01/20 | 2013451 | ET TROJAN NgrBot IRC CnC Channel Join; [1] |
10,772 | 2015/01/20 | 2013450 | ET TROJAN Troxen Downloader Checkin; [1] |
10,771 | 2015/01/20 | 2013449 | ET DELETED W32/Rbot User-Agent (tiehttp); |
10,770 | 2015/01/20 | 2013448 | ET MALWARE SurfSideKick Activity (iinfo); |
10,769 | 2015/01/20 | 2013447 | ET TROJAN Win32/TrojanDownloader.Chekafe.D Initial Checkin; |
10,768 | 2015/01/20 | 2013446 | ET TROJAN Win32/TrojanDownloader.Chekafe.D User-Agent my_check_data On Off HTTP Port; |
10,767 | 2015/01/20 | 2013445 | ET TROJAN W32/NetShare User-Agent; |
10,766 | 2015/01/20 | 2013444 | ET TROJAN Win32/Onescan FraudWare User-Agent; |
10,765 | 2015/01/20 | 2013443 | ET TROJAN W32/Mnless Checkin; |
10,764 | 2015/01/20 | 2013442 | ET DELETED EXE Download When Server Claims To Send Audio File - DOS Mode; |
10,763 | 2015/01/20 | 2013441 | ET TROJAN EXE Download When Server Claims To Send Audio File - Must Be Win32; |
10,762 | 2015/01/20 | 2013440 | ET TROJAN W32/DirtJumper CnC Server Providing DDOS Targets; [1] |
< 321 322 323 324 325 326 327 328 329 330 > |