Tabela Bleeding Snort

Nazwa exploita Ile razy Unikalnych
źródeł
 MISC MS Terminal server request   21760   1620 
 ET POLICY RDP connection request   21759   1620 
 ET SCAN Potential SSH Scan   13600   625 
 ET POLICY RDP disconnect request   13124   152 
 ICMP Destination Unreachable Communication with Destination Host is Administratively Prohibited   10577   7 
 ET POLICY Suspicious inbound to MSSQL port 1433   10027   258 
 ET SCAN Potential VNC Scan 5900-5920   8098   48 
 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)   7535   73 
 ICMP PING NMAP   4083   1897 
 ET POLICY Suspicious inbound to mySQL port 3306   3797   95 
 SNMP request udp   3636   17 
 SNMP public access udp   3635   16 
 ET SCAN LibSSH Based SSH Connection - Often used as a BruteForce Tool   3524   273 
 SCAN UPnP service discover attempt   2764   27 
 CP Scanning for open IPMI   1992   25 
 ET SCAN Cisco Torch SNMP Scan   1979   12 
 DNS named version attempt   1974   10 
 CP Scanning for DNS open-resolver: Shadowserver   1673   15 
 CP Scanning for DNS open-resolver: Chinanet. Query: www.google.com   1586   2 
 ET POLICY Radmin Remote Control Session Setup Initiate   1581   989