Tabela Bleeding Snort

Nazwa exploita Ile razy Unikalnych
źródeł
 ET SCAN Potential SSH Scan   25038   410 
 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)   15688   116 
 MISC MS Terminal server request   13427   1464 
 ET POLICY RDP connection request   13424   1464 
 ET SCAN LibSSH Based SSH Connection - Often used as a BruteForce Tool   12862   207 
 ICMP Destination Unreachable Communication with Destination Host is Administratively Prohibited   10889   94 
 ET POLICY Suspicious inbound to MSSQL port 1433   10186   262 
 ET POLICY RDP disconnect request   7673   197 
 ET POLICY Suspicious inbound to mySQL port 3306   6232   225 
 SCAN UPnP service discover attempt   5616   68 
 ET SCAN Potential VNC Scan 5900-5920   5074   96 
 ICMP PING NMAP   3337   1528 
 SNMP public access udp   3216   36 
 SNMP request udp   3215   36 
 ET POLICY Suspicious inbound to Oracle SQL port 1521   2545   56 
 DNS named version attempt   2472   14 
 ET SCAN Cisco Torch SNMP Scan   2153   29 
 ET SCAN Sipvicious Scan   1677   117 
 ET POLICY Radmin Remote Control Session Setup Initiate   1279   672 
 CP Scanning for NTP servers. Request code: MON_GETLIST_1   1251   18