Tabela Bleeding Snort

Nazwa exploita Ile razy Unikalnych
źródeł
 MISC MS Terminal server request   28358   1721 
 ET POLICY RDP connection request   28347   1721 
 ET POLICY RDP disconnect request   17580   134 
 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)   17013   199 
 ET SCAN LibSSH Based SSH Connection - Often used as a BruteForce Tool   16144   261 
 ICMP Destination Unreachable Communication with Destination Host is Administratively Prohibited   11924   154 
 ET SCAN Potential SSH Scan   11221   482 
 SNMP public access udp   8744   26 
 SNMP request udp   8742   26 
 ET POLICY Suspicious inbound to MSSQL port 1433   8070   262 
 SCAN UPnP service discover attempt   7865   42 
 ET SCAN Potential VNC Scan 5900-5920   7376   70 
 ET POLICY Suspicious inbound to mySQL port 3306   4132   86 
 ICMP PING NMAP   4128   1813 
 ET SCAN Sipvicious Scan   2517   199 
 ET SCAN Cisco Torch SNMP Scan   1871   14 
 CP Scanning for open IPMI   1798   29 
 DNS named version attempt   1649   15 
 ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack!   1614   173 
 CP Scanning for DNS open-resolver: Shadowserver   1552   1