Está en la página 1de 61

IP

17.172.232.162
72.21.91.19
54.230.48.145
72.21.91.19
72.21.91.19
54.230.48.145
23.45.65.10
72.21.91.19
96.44.147.186
209.107.220.16
193.182.8.76
72.21.91.19
63.251.85.33
72.21.91.19
93.184.216.139
72.21.91.19
157.56.148.23
54.230.48.145
17.151.140.30
63.251.85.33
72.21.91.19
23.66.230.115
74.125.226.231
72.21.91.19
108.160.165.84
199.27.72.185
74.125.226.242
74.125.22.95
72.21.91.19
72.21.91.19
8.8.8.8
205.185.204.11
54.230.50.132
64.208.138.104
205.185.204.8
93.184.216.139
66.155.11.250
93.184.216.139
72.21.91.19
131.253.40.50
199.27.72.185
8.8.8.8

Type
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Spam
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Malware
Malware
Attacks
P2P
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Malware

209.167.231.15
72.21.91.19
23.66.230.115
66.235.138.18
72.21.91.19
94.245.121.176
131.253.40.50
72.21.91.19
108.160.162.53
69.31.132.96
66.117.23.103
72.21.91.19
131.253.40.50
72.246.55.35
8.8.8.8
72.21.91.19
131.253.40.50
173.194.74.84
207.200.29.91
23.4.37.163
50.31.164.188
72.21.91.19
72.21.91.19
72.21.91.19
192.150.3.160
64.4.11.36
64.4.11.36
173.255.243.189
8.8.8.8
93.184.216.139
108.160.162.76
74.125.22.95
173.255.243.189
108.160.162.39
66.117.23.103
173.194.65.91
208.89.13.133
208.89.13.133
74.125.226.225
131.253.34.142
107.20.203.158
8.8.8.8
208.89.13.133
50.31.164.168
74.125.226.225
66.235.138.18
208.89.13.133

Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Phish_Host
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Spam
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks

108.160.162.35
74.125.226.225
8.8.8.8
23.66.230.115
199.30.80.32
23.33.187.112
108.160.162.35
74.125.22.84
107.20.203.158
64.208.138.104
8.18.45.80
208.89.13.133
72.21.91.19
93.184.216.139
67.228.177.234
72.21.91.19
66.235.138.226
23.52.85.163
54.230.48.145
8.8.8.8
74.125.22.95
66.155.11.250
72.21.81.189
72.21.91.19
173.194.78.120
50.31.164.168
72.21.91.19
17.173.254.11
199.16.156.198
93.184.216.139
199.59.148.247
199.30.80.32
209.167.231.15
80.12.96.16
72.21.91.19
23.66.230.115
72.21.91.43
23.45.65.10
63.251.85.33
178.255.83.1
23.66.230.115
54.230.50.132
8.8.8.8
74.125.226.222
199.30.80.32
72.21.91.19
208.89.13.133

Attacks
Attacks
Phish_Host
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks

199.59.148.247
108.160.162.110
173.194.35.47
178.255.83.1
108.160.165.253
72.21.91.19
64.4.11.36
17.173.254.11
108.160.162.76
54.230.50.132
23.66.230.115
108.160.162.53
50.31.164.188
108.160.165.212
8.8.8.8
108.160.162.108
72.21.91.19
108.160.162.53
8.8.8.8
93.184.216.139
208.89.13.133
209.167.231.15
131.253.34.142
108.160.162.53
23.66.230.115
144.76.113.131
8.8.8.8
108.160.165.83
108.160.165.83
72.21.91.19
72.21.91.19
207.200.27.85
74.125.226.225
23.66.230.115
80.12.96.16
67.228.177.237
8.8.8.8
72.21.91.19
17.172.232.145
192.150.3.161
17.172.232.149
23.45.65.11
23.66.230.115
83.145.197.2
173.255.243.189
23.66.230.115
173.194.76.125

Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks

199.30.80.32
192.33.31.101
81.18.240.138
207.200.29.91
209.167.231.15
17.172.232.149
67.228.177.236
74.125.226.225
174.37.236.18
72.21.91.19
17.171.8.16
23.66.230.115
131.253.34.142
74.125.22.95
72.21.81.189
108.160.163.38
205.185.204.50
173.194.76.125
199.27.72.185
207.200.29.91
54.235.136.253
77.234.41.82
199.30.80.32
8.8.8.8
64.208.138.104
72.21.91.19
199.59.148.247
173.194.78.120
72.21.91.19
72.21.91.19
72.21.91.19
8.8.8.8
17.172.232.110
17.172.232.145
17.149.36.186
74.125.226.225
72.21.91.19
66.155.11.250
80.12.96.16
8.8.8.8
23.66.230.115
66.235.138.225
72.21.91.19
178.255.83.1
17.172.232.145
72.21.91.19
74.125.226.231

Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Bot
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks

54.230.51.218
8.8.8.8
23.33.187.112
74.125.226.231
207.200.27.85
72.14.246.54
74.125.226.225
192.150.3.51
72.21.91.19
50.31.164.188
173.194.35.47
108.160.165.212
108.160.163.38
209.167.231.15
72.21.91.19
131.253.34.142
8.8.8.8
108.160.165.211
8.8.8.8
50.31.164.168
96.44.147.186
8.8.8.8
199.27.72.185
17.151.16.12
17.151.140.30
209.167.231.15
72.21.91.19
173.194.74.84
8.8.8.8
23.66.230.115
131.253.34.142
69.31.75.185
199.16.156.198
74.125.226.231
72.21.91.19
108.160.162.76
74.125.226.231
207.200.27.85
8.8.8.8
108.160.162.76
8.18.45.80
63.251.85.33
23.33.187.49
67.228.177.234
63.251.85.33
23.66.230.115
72.21.91.19

Attacks
Phish_Host
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
P2P
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks

65.54.93.143
17.149.36.84
131.253.34.142
72.21.91.19
108.160.165.84
50.31.164.188
66.117.23.103
72.21.91.19
108.160.162.53
108.160.165.83
108.160.165.211
8.8.8.8
50.31.164.168
72.21.91.19
193.182.8.38
178.255.83.1
8.8.8.8
72.21.91.19
50.31.164.168
66.117.23.103
173.194.35.47
17.173.254.11
108.160.163.44
17.251.224.40
131.253.40.48
66.235.138.18
192.33.31.101
72.21.91.29
66.117.23.103
199.59.148.247
131.253.40.50
108.160.162.76
72.21.91.19
131.253.40.48
192.33.31.101
66.235.138.225
23.66.230.115
54.230.48.145
17.149.36.186

Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Bot
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks

Symantec DeepSight IR Report for Community Health Center


Symantec and CHC Confidential Information
Description
Evasive Traffic Detection
Malicious iframe Image Request
Generic Corrupted Icon File Event
Evasive Traffic Detection
HTTP MSIE CSS File Memory Corruption
LilyJade Malware Activity
libxml XML Entity Name Heap Buffer Overflow Vulnerability
Oracle Misparsed Login Response
No Content Length HTTP Response
Generic Javascript Obfuscation Attack
Evasive Traffic Detection
Generic Cross-site scripting (XSS) Attack
No Content Length HTTP Response
Generic Javascript Obfuscation Attack
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Spam Email/Events
DirectShow Overflow Attack
Facebook Fake Survey Manual Sharing
Apple iTunes AAC File Parsing Integer Overflow Vulnerability
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
Clickjacking Attack Via CSS Pointer-Event
Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Vulnerability
Stream.c Denial of Service Attack
Oracle Java readMabCurveData() BO
Evasive Traffic Detection
Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Vulnerability
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Stream.c Denial of Service Attack
Stream.c Denial of Service Attack
POLICY Adobe PDF header obfuscation
Generic Gnutella Traffic
Generic Cross-site scripting (XSS) Attack
Microsoft Internet Explorer 'iepeers.dll' RCE Attack
Clickjacking Attack Via CSS Pointer-Event
Generic Javascript Obfuscation Attack
Generic X86 Buffer Overflow (setgid(0) ) Attack
Out-of-Sequence TCP RST Packet
Stream.c Denial of Service Attack
Microsoft IE Layout Handling Use After Free Remote Memory Corruption Vulnerability
Generic HTTP request method unknown
Sweet Orange Exploit Kit Website
System Infected: Poison IVY Backdoor Activity

ht://dig Arbitrary File Inclusion or Disclosure Attack


Out-of-Sequence TCP RST Packet
DirectShow Overflow Attack
Out-of-Sequence TCP RST Packet
BitDefender Internet Security 2009 File Name XSS Vulnerability
Microsoft Windows Media Player Plugin Buffer Overflow Attack
Generic HTTP Referrer Tag in HTML Event
Microsoft Windows Embedded Open Type Font Malformed Name Table Attack
Evasive Traffic Detection
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Evasive Traffic Detection
Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Attack
Out-of-Sequence TCP RST Packet
Suspicious Executable Image Attack
Phishing Site targeting http
Generic HTTP URI Possible Evasion Attack
Evasive Traffic Detection
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
No Content Length HTTP Response
Evasive Traffic Detection
No Content Length HTTP Response
Microsoft IE CreateTextRange Remote Code Execution Vulnerability
Apple QuickTime Information Disclosure and Multiple Code Execution Vulnerabilities
DirectShow Overflow Attack
Evasive Traffic Detection
Email received by spam decoy email address
Evasive Traffic Detection
Evasive Traffic Detection
Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Memory Corruption
W32.IRCBot.Gen
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
DirectShow Overflow Attack
Evasive Traffic Detection
Generic HTTP request method unknown
W32.Waledac
TCP Bad Segment Detected
Evasive Traffic Detection
Oracle Java Hotspot Sub-component CVE-2012-1723 Remote Code Execution Vulnerability
Generic HTTP request method unknown
Out-of-Sequence TCP RST Packet
Generic ICMP Echo Unexpected Reply
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
No Content Length HTTP Response
Microsoft Malformed PNG File Code Execution and Overflow attack
Evasive Traffic Detection
TCP Zero Length

Evasive Traffic Detection


DirectShow Overflow Attack
Phishing Site targeting paypal.com
Microsoft GDI+ PNG File Processing Remote Code Execution Vulnerability
W32.IRCBot.Gen
Internet Explorer CSS Strings Memory Corruption Vulnerability
Generic HTTP request method unknown
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Evasive Traffic Detection
HTML Script Extension Evasion
Evasive Traffic Detection
No Content Length HTTP Response
libpng Memory Corruption and Memory Leak Vulnerabilities
Generic TCP Sequence Number Approximation in BGP Attack
Out-of-Sequence TCP RST Packet
LibPNG Graphics Library Multiple Remote Attack
Out-of-Sequence TCP RST Packet
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Generic Javascript Obfuscation Attack
Oracle Secure Backup 'observice.exe' Remote Code Execution Attack
DirectShow Overflow Attack
No Content Length HTTP Response
Evasive Traffic Detection
Microsoft Windows Embedded OpenType Font Engine Remote Code Execution Vulnerability
No Content Length HTTP Response
Microsoft ISA Server HTTP Request Smuggling Attack
Generic Corrupted Icon File Event
TCP Bad Segment Detected
Out-of-Sequence TCP RST Packet
Evasive Traffic Detection
Generic HTTP request method unknown
Out-of-Sequence TCP RST Packet
DirectShow Overflow Attack
Bloodhound.Exploit.141
Microsoft Internet Explorer DHTML Object Race Condition Memory Corruption
Adobe Acrobat and Reader CVE-2011-0602 Image Parsing RCE
Apple iTunes AAC File Parsing Integer Overflow Vulnerability
Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Vulnerability
TCP Bad Segment Detected
Evasive Traffic Detection
libpng Memory Corruption and Memory Leak Vulnerabilities
Generic Javascript Obfuscation Attack
Multi-exploit web attack toolkit
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Microsoft GDI+ PNG File Processing Remote Code Execution Vulnerability
DirectShow Overflow Attack

Evasive Traffic Detection


Evasive Traffic Detection
No Content Length HTTP Response
Out-of-Sequence TCP RST Packet
Out-of-Sequence TCP RST Packet
Microsoft Internet Explorer 'iepeers.dll' RCE Attack
No Content Length HTTP Response
Evasive Traffic Detection
Out-of-Sequence TCP RST Packet
JRE Deployment Toolkit ActiveX Control Multiple BO
Adobe Flash SWF Plugin Code Exec
Generic TCP Small Segment Attack
Out-of-Sequence TCP RST Packet
Out-of-Sequence TCP RST Packet
Generic Non-Printable character in SIP header event
Evasive Traffic Detection
Mozilla Firefox Error Page Address Bar URI Spoofing Attack
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
Facebook Fake Survey Manual Sharing
Generic VoIP suspicious traffic
Out-of-Sequence TCP RST Packet
Generic URI Display Obfuscation Attack
Out-of-Sequence TCP RST Packet
Out-of-Sequence TCP RST Packet
Clickjacking Attack Via CSS Pointer-Event
Generic X86 Buffer Overflow (stealth NOP) Attack
DNS Response containing Private (RFC 1918) address
Generic HTTP request method unknown
Evasive Traffic Detection
Adobe Acrobat and Reader CoolType.dll Remote DoS Attack
Adobe Flash Player Multimedia File Remote Buffer Overflow
No Content Length HTTP Response
Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Vulnerability
Microsoft Malformed PNG File Code Execution and Overflow attack
Apple iTunes AAC File Parsing Integer Overflow Vulnerability
Out-of-Sequence TCP RST Packet
Microsoft Windows DNS Client Buffer Overrun attempt
Microsoft Internet Explorer Marquee Tag Handling RCE Vulnerability
Evasive Traffic Detection
Evasive Traffic Detection
Evasive Traffic Detection
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Web Reputation Event
Evasive Traffic Detection
Generic Windows Executable File HTTP Download
JRE Deployment Toolkit ActiveX Control Multiple BO
Generic VoIP suspicious traffic

Evasive Traffic Detection


Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Evasive Traffic Detection
Evasive Traffic Detection
Evasive Traffic Detection
Generic TCP Small Segment Attack
Out-of-Sequence TCP RST Packet
Generic Corrupted Icon File Event
Evasive Traffic Detection
Generic HTTP request method unknown
Evasive Traffic Detection
Adobe Flash Player InitArray Memory Corruption Attack
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Out-of-Sequence TCP RST Packet
Generic HTTP request method unknown
Generic Cross-site scripting (XSS) Attack
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Adobe Flash Player InitArray Memory Corruption Attack
Microsoft IE and Mozilla Firefox URI Handler Command Injection Attack
Generic Javascript Obfuscation Attack
Out-of-Sequence TCP RST Packet
No Content Length HTTP Response
Microsoft Windows DNS Server NAPTR Query Remote Code Execution Vulnerability
Evasive Traffic Detection
Adobe Flash Player InitArray Memory Corruption Attack
Out-of-Sequence TCP RST Packet
Evasive Traffic Detection
Adobe Acrobat and Reader CVE-2011-0602 Image Parsing RCE
Generic Bot detection
Microsoft Windows Media Player Plugin Buffer Overflow Attack
Generic Malicious Site Request detected
Evasive Traffic Detection
Generic HTTP request method unknown
Generic HTTP request method unknown
libpng Memory Corruption and Memory Leak Vulnerabilities
Microsoft Windows Kodak Image Viewer Remote Code Execution Vulnerability
Evasive Traffic Detection
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Generic DNS Cache Corruption (Query ID's) Attack
Generic Javascript Obfuscation Attack
Out-of-Sequence TCP RST Packet
No Content Length HTTP Response
Generic HTTP request method unknown
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
Adobe Flash Cross-site Scripting Attack
DirectShow Overflow Attack

Generic Javascript Obfuscation Attack


Phishing Site targeting apple.com
Suspicious Executable Image Attack
Binary Shellcode NOOP Attack
Evasive Traffic Detection
Generic file URI scheme
Evasive Traffic Detection
Evasive Traffic Detection
Internet Explorer CSS Strings Memory Corruption Vulnerability
Evasive Traffic Detection
Out-of-Sequence TCP RST Packet
Evasive Traffic Detection
Evasive Traffic Detection
Clickjacking Attack Via CSS Pointer-Event
Mozilla Browser Non-ASCII Hostname Heap Overflow Attack
No Content Length HTTP Response
EDonkey Traffic
Evasive Traffic Detection
Microsoft MDAC Function Broadcast Response Buffer Overrun Attack
Evasive Traffic Detection
DirectShow Overflow Attack
IOS Stack Group Bidding Protocol DoS Attack
Evasive Traffic Detection
Cisco IOS DHCP Input Queue Blocking Denial Of Service Attack
Evasive Traffic Detection
No Content Length HTTP Response
Heap Spray Characters Detected
Stream.c Denial of Service Attack
Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
Adobe Acrobat and Reader CoolType.dll Remote DoS Attack
Evasive Traffic Detection
Adobe Flash Player InitArray Memory Corruption Attack
Stream.c Denial of Service Attack
Oracle Java Hotspot Sub-component CVE-2012-1723 Remote Code Execution Vulnerability
Microsoft DirectX DirectShow QuickTime Video Remote Code Execution Vulnerability
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
libpng Memory Corruption and Memory Leak Vulnerabilities
Generic HTTP request method unknown
No DNS authority records for the query and it has a DNS time-to-live of 1.
Evasive Traffic Detection
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Evasive Traffic Detection
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Generic HTTP request method unknown
Generic HTTP request method unknown
Microsoft Windows Image Color Management Remote Code Execution Vulnerability
Kaspersky Antivirus cab heap overflow

Adobe Flash Player InitArray Memory Corruption Attack


Evasive Traffic Detection
Generic HTTP Referrer Tag in HTML Event
Adobe Flash SWF Plugin Code Exec
Out-of-Sequence TCP RST Packet
Microsoft ISA Server HTTP Request Smuggling Attack
Stream.c Denial of Service Attack
libxml XML Entity Name Heap Buffer Overflow Vulnerability
Generic HTTP request method unknown
Out-of-Sequence TCP RST Packet
Out-of-Sequence TCP RST Packet
Generic Bot detection
Out-of-Sequence TCP RST Packet
Generic TCP Small Segment Attack
Evasive Traffic Detection
Data Send After TCP Reset
Web Reputation Event
g01pack Toolkit Attack
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Out-of-Sequence TCP RST Packet
Evasive Traffic Detection
Generic TCP Small Segment Attack
Evasive Traffic Detection
Evasive Traffic Detection
Evasive Traffic Detection
No Content Length HTTP Response
Evasive Traffic Detection
Evasive Traffic Detection
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
No Content Length HTTP Response
No Content Length HTTP Response
Generic HTTP request method unknown
Binary Shellcode NOOP Attack
Out-of-Sequence TCP RST Packet
No Content Length HTTP Response
No Content Length HTTP Response
Microsoft Malware Protection Engine Disk Space Exhaustion Remote DoS Vulnerability
Adobe Flash Player InitArray Memory Corruption Attack
Evasive Traffic Detection

Reports
88
20
2
5123
42
1
1
1
6
8
24
21
2
1293
1
2
2
1
1
4
1
2
7
4
257
37
1
3
296
10
2811
1
1
2
154
1
2
364
5
4
18
51

Incidents
88
20
2
5123
42
1
1
1
6
8
24
21
2
1293
1
2
2
1
1
4
1
2
7
4
257
37
1
3
296
10
2811
1
1
2
154
1
2
364
5
4
18
51

First
Latest
2013-07-25 01:24:36
2013-09-09 00:08:40
2013-07-24 04:09:08
2013-09-16 06:52:49
2013-07-24 12:44:11
2013-07-24 12:44:11
2013-07-19 02:30:23
2013-09-13 09:37:42
2013-07-22 20:48:49
2013-10-14 16:17:11
2013-08-31 18:04:21
2013-08-31 18:04:21
2013-09-18 18:56:40
2013-09-18 18:56:40
2013-08-13 13:59:05
2013-08-13 13:59:05
2013-09-14 04:22:51
2013-09-14 04:26:27
2013-09-11 06:36:45
2013-09-23 11:01:14
2013-07-24 04:17:11
2013-07-24 06:22:10
2013-07-19 14:55:10
2013-10-15 20:47:43
2013-08-20 09:29:59
2013-08-20 09:29:59
2013-07-19 00:22:07
2013-10-16 02:37:24
2013-08-06 20:30:18
2013-08-06 20:30:18
2013-08-15 00:00:00
2013-08-15 00:00:00
2013-09-12 18:36:48
2013-09-12 18:36:48
2013-09-05 09:41:32
2013-09-05 09:41:32
2013-08-14 00:44:28
2013-08-14 00:44:28
2013-08-13 11:37:17
2013-09-26 03:29:22
2013-07-25 19:25:28
2013-07-25 19:25:28
2013-09-16 17:44:28
2013-09-16 17:53:15
2013-10-10 19:58:37
2013-10-10 19:58:37
2013-07-24 19:56:23
2013-09-16 19:33:23
2013-08-28 04:15:30
2013-09-13 10:43:59
2013-08-01 13:45:14
2013-10-15 18:27:10
2013-10-07 13:23:07
2013-10-07 13:23:07
2013-09-30 17:41:44
2013-10-07 14:57:58
2013-07-29 18:58:10
2013-10-15 20:33:15
2013-07-29 22:08:15
2013-08-23 14:38:15
2013-07-19 00:00:59
2013-10-16 23:43:42
2013-09-19 19:27:28
2013-09-19 19:27:28
2013-09-03 19:30:48
2013-09-03 19:30:48
2013-07-19 11:27:22
2013-07-19 13:13:56
2013-09-06 12:19:25
2013-10-15 20:32:06
2013-07-25 08:54:16
2013-07-25 08:54:16
2013-10-03 13:18:47
2013-10-03 13:18:47
2013-08-06 17:34:20
2013-10-16 18:19:02
2013-10-16 11:18:30
2013-10-16 23:33:47
2013-08-25 23:58:01
2013-10-10 08:19:17
2013-09-26 21:14:06
2013-10-11 13:08:08
2013-07-21 14:42:07
2013-09-22 21:03:19

1
48
18
48
6
4
2
1793
1876
2
386
6
135
1
4
3
702
15
12
3
26
12
2
631
195
1825
235
20
37691
3
2
6
2
21
2
1
23
454
17
6
2
6
38
58
1
1104
3

1
48
18
48
6
4
2
1793
1876
2
386
6
135
1
4
3
702
15
12
3
26
12
2
631
195
1712965
235
20
37691
3
2
6
2
21
2
1
23
454
17
6
2
6
38
58
1
1104
3

2013-07-20 02:22:09
2013-07-20 02:22:09
2013-07-23 23:12:00
2013-10-16 07:29:09
2013-08-01 19:05:10
2013-10-09 14:48:18
2013-07-22 09:59:32
2013-10-10 08:25:32
2013-08-19 15:38:50
2013-09-24 17:58:24
2013-09-11 15:05:25
2013-09-25 16:42:11
2013-08-24 02:18:16
2013-08-24 02:18:16
2013-07-19 00:07:32
2013-08-01 17:44:33
2013-07-19 00:46:56
2013-09-12 06:33:47
2013-09-19 19:14:54
2013-09-19 19:14:54
2013-07-19 06:13:33
2013-09-13 07:33:41
2013-07-19 02:57:58
2013-09-17 19:47:18
2013-07-24 01:31:56
2013-10-16 08:51:50
2013-08-19 21:31:02
2013-08-19 21:31:02
2013-08-30 16:44:36
2013-09-26 08:35:46
2013-08-22 12:19:48
2013-08-22 13:07:42
2013-07-19 03:08:07
2013-09-13 05:54:01
2013-08-29 14:49:39
2013-10-03 19:17:20
2013-07-30 03:20:26
2013-10-07 06:44:07
2013-07-27 10:02:18
2013-08-06 10:03:06
2013-09-23 01:00:19
2013-10-16 06:12:09
2013-07-26 20:31:22
2013-08-28 14:54:37
2013-08-15 18:18:48
2013-10-08 15:29:00
2013-07-31 12:54:31
2013-10-16 20:46:35
2013-07-19 05:27:25
2013-09-02 00:19:14
2013-07-19 00:41:46
2013-10-16 23:26:02
2013-07-19 03:08:07
2013-09-13 04:23:52
2013-07-29 02:08:14
2013-09-10 05:48:59
2013-07-19 00:03:06
2013-10-16 23:59:56
2013-07-20 03:10:12
2013-07-21 14:42:59
2013-09-13 02:29:58
2013-09-13 02:29:58
2013-09-25 11:57:24
2013-10-15 20:58:03
2013-08-28 06:18:48
2013-08-28 06:18:48
2013-07-26 02:16:35
2013-09-09 04:37:03
2013-10-14 05:18:29
2013-10-14 05:18:29
2013-08-17 12:31:56
2013-08-17 12:31:56
2013-09-14 03:40:59
2013-10-09 05:51:03
2013-07-19 03:04:35
2013-09-13 03:58:21
2013-07-25 12:29:54
2013-09-22 00:14:17
2013-08-19 05:22:41
2013-10-04 05:09:53
2013-07-21 12:53:35
2013-07-21 12:53:35
2013-10-03 15:45:00
2013-10-03 16:12:50
2013-08-09 20:40:13
2013-10-16 21:59:22
2013-07-29 18:07:43
2013-10-10 06:44:02
2013-07-23 17:12:42
2013-07-23 17:12:42
2013-07-19 00:51:33
2013-09-13 05:53:14
2013-10-03 22:26:32
2013-10-03 22:26:50

34
4
1
1
1
4
18
1
97
2
1
32
5
484
2
2
8
1
12
355
2
2
110
20
28
31
2634
4
2
18
2
207
6
1
1
8
1
1
2
3080
1
4
1
1
3
3
35

34
4
1
1
1
4
18
1
97
2
1
32
5
484
2
2
8
1
12
355
2
2
110
20
28
31
2634
4
2
18
2
207
6
1
1
8
1
1
2
3080
1
4
1
1
3
3
35

2013-07-25 23:48:00
2013-09-06 04:41:19
2013-09-12 15:00:41
2013-09-12 20:32:47
2013-08-29 10:57:29
2013-08-29 10:57:29
2013-09-16 17:44:22
2013-09-16 17:44:22
2013-07-21 14:28:45
2013-07-21 14:28:45
2013-07-23 21:13:49
2013-08-23 14:51:03
2013-07-26 03:11:07
2013-07-26 04:35:41
2013-09-25 18:00:59
2013-09-25 18:00:59
2013-08-06 08:18:58
2013-09-13 00:40:03
2013-10-16 11:42:03
2013-10-16 11:42:03
2013-07-22 21:51:24
2013-07-22 21:51:24
2013-08-02 21:21:25
2013-10-16 05:55:31
2013-08-05 16:27:59
2013-10-02 05:26:59
2013-07-28 07:29:04
2013-09-24 08:02:44
2013-09-30 07:00:26
2013-09-30 07:00:26
2013-08-09 20:23:47
2013-08-11 18:18:43
2013-10-08 06:13:47
2013-10-10 05:02:57
2013-09-18 16:26:13
2013-09-18 16:26:13
2013-07-19 21:39:51
2013-09-05 09:24:38
2013-08-14 04:07:43
2013-10-16 23:58:34
2013-10-07 20:42:03
2013-10-07 20:42:03
2013-07-22 03:05:11
2013-07-22 03:05:11
2013-07-30 02:16:23
2013-09-09 06:06:30
2013-07-19 19:18:28
2013-08-06 19:23:52
2013-07-22 10:54:23
2013-10-16 03:19:14
2013-07-26 03:00:40
2013-09-27 02:51:41
2013-07-31 03:43:22
2013-10-16 22:24:04
2013-09-14 04:50:40
2013-09-15 09:03:39
2013-09-26 02:25:20
2013-09-26 02:25:20
2013-07-21 06:05:32
2013-08-11 07:54:28
2013-09-17 03:09:24
2013-09-17 03:09:24
2013-07-19 22:53:41
2013-10-16 10:06:23
2013-08-14 17:44:03
2013-09-19 14:29:11
2013-09-23 10:53:43
2013-09-23 10:53:43
2013-08-27 09:26:16
2013-08-27 09:26:16
2013-07-19 14:10:16
2013-10-16 14:10:38
2013-09-11 14:21:05
2013-09-11 14:21:05
2013-09-18 17:36:08
2013-09-18 17:36:08
2013-09-09 06:09:27
2013-09-09 06:09:27
2013-07-19 00:21:55
2013-10-16 05:35:29
2013-08-26 16:06:11
2013-08-26 16:06:11
2013-08-16 14:51:31
2013-09-03 08:39:23
2013-09-10 13:34:22
2013-09-10 13:34:22
2013-07-31 03:23:06
2013-07-31 03:23:06
2013-08-13 19:08:20
2013-09-19 14:47:39
2013-09-19 14:37:49
2013-09-19 14:40:15
2013-08-02 18:44:14
2013-10-08 17:40:20

17734
21
22
6
2
7
2
187
12
2
1
2
26
18
30
11
63
2
1
2
12
2
172
2
15
4
143
2
305
770
1
4
1
1
15
4
4
3
110
258
92
1
1
20
2
2
1

17734
21
22
6
2
7
2
187
12
2
1
2
26
18
30
11
63
2
1
2
12
2
172
2
15
4
143
2
305
770
1
4
1
1
15
4
4
3
110
258
92
1
1
20
2
2
1

2013-07-19 00:48:51
2013-09-13 11:20:20
2013-07-22 06:01:14
2013-09-06 05:27:02
2013-07-29 00:22:26
2013-10-16 01:31:35
2013-09-09 03:04:26
2013-09-10 08:07:46
2013-10-04 07:16:14
2013-10-04 07:16:14
2013-07-25 17:20:32
2013-10-14 18:32:11
2013-10-02 10:29:51
2013-10-02 10:29:51
2013-08-04 23:39:33
2013-09-09 08:24:43
2013-09-26 10:40:37
2013-10-16 08:08:00
2013-08-21 19:02:58
2013-09-05 19:35:20
2013-07-19 13:26:46
2013-07-19 13:26:46
2013-09-19 06:47:57
2013-09-19 06:47:57
2013-09-03 06:48:30
2013-10-16 04:54:14
2013-09-09 02:45:37
2013-10-16 09:08:14
2013-07-25 10:11:21
2013-10-16 23:51:31
2013-08-26 04:18:42
2013-09-13 04:14:07
2013-09-05 17:24:59
2013-10-11 19:08:58
2013-09-11 06:24:11
2013-09-11 06:24:11
2013-09-05 08:03:42
2013-09-05 08:03:42
2013-08-07 14:46:24
2013-08-20 18:59:24
2013-09-03 01:44:41
2013-10-13 11:15:43
2013-08-20 01:39:26
2013-09-10 01:35:01
2013-07-22 02:37:23
2013-10-14 04:34:26
2013-07-26 05:28:17
2013-07-26 05:28:17
2013-07-19 00:08:58
2013-07-24 22:34:43
2013-10-07 06:50:11
2013-10-07 06:50:20
2013-07-22 14:09:23
2013-10-16 23:15:38
2013-09-12 04:09:19
2013-09-12 04:09:19
2013-08-28 04:14:36
2013-09-13 08:44:01
2013-10-16 03:26:47
2013-10-16 23:52:16
2013-08-18 11:58:57
2013-08-18 11:58:57
2013-08-29 05:05:35
2013-09-06 04:14:59
2013-07-30 13:19:39
2013-07-30 13:19:39
2013-09-16 17:53:48
2013-09-16 17:53:48
2013-09-10 23:37:07
2013-10-16 22:06:46
2013-08-12 06:47:57
2013-08-27 06:46:02
2013-07-19 15:00:13
2013-07-19 15:00:31
2013-08-05 14:29:17
2013-08-24 17:54:51
2013-07-23 07:03:22
2013-09-12 06:06:16
2013-07-19 05:27:42
2013-09-05 09:07:50
2013-07-24 02:25:39
2013-09-10 06:46:35
2013-09-25 19:49:35
2013-09-25 19:49:35
2013-07-21 23:13:39
2013-07-21 23:13:39
2013-08-26 02:45:20
2013-08-29 02:05:02
2013-09-14 04:03:20
2013-09-14 04:03:20
2013-08-15 18:28:54
2013-09-05 22:32:14
2013-10-04 13:24:37
2013-10-04 13:24:37

1065
10
15
8
230
2
6
1
91
2
2
3
2
1
2
34
1
1
7
3
3
2
16
6
3
148
106
61
12
2
14
7
96
2
2
3
2
256
2
8449
53
4
76
4
2
10
2

1065
10
15
8
230
2
6
1
91
2
2
3
2
1
2
34
1
1
7
3
3
2
16
6
3
148
106
61
12
2
14
7
96
2
2
3
2
256
2
8449
53
4
76
4
2
10
2

2013-07-20 05:49:03
2013-09-13 06:13:07
2013-07-22 17:54:08
2013-09-24 18:24:28
2013-07-26 03:05:03
2013-08-23 07:47:40
2013-07-26 03:04:57
2013-08-23 07:47:21
2013-07-19 00:19:13
2013-09-13 08:54:16
2013-10-13 12:39:41
2013-10-13 12:39:41
2013-08-13 23:18:25
2013-10-01 07:10:08
2013-10-10 19:04:49
2013-10-10 19:04:49
2013-07-24 02:16:16
2013-09-11 05:46:21
2013-09-19 07:09:12
2013-09-19 07:09:12
2013-09-05 03:02:15
2013-09-05 03:45:22
2013-07-19 14:22:43
2013-07-31 15:24:35
2013-08-19 05:22:41
2013-08-19 05:22:41
2013-09-27 17:43:09
2013-09-27 17:43:09
2013-09-16 14:03:45
2013-09-16 14:03:45
2013-07-26 06:18:12
2013-07-26 08:20:17
2013-09-17 18:54:38
2013-09-17 18:54:38
2013-09-25 11:53:31
2013-09-25 11:53:31
2013-09-25 18:42:44
2013-10-09 22:15:08
2013-08-13 00:15:35
2013-10-09 03:26:40
2013-08-19 22:56:37
2013-10-12 02:20:37
2013-08-27 03:53:58
2013-08-27 03:53:58
2013-07-24 01:27:16
2013-10-16 01:29:54
2013-09-14 21:33:28
2013-09-18 23:06:12
2013-08-07 01:26:58
2013-08-09 03:46:58
2013-07-19 18:30:56
2013-10-16 15:32:04
2013-10-07 16:17:20
2013-10-14 17:46:24
2013-07-25 03:25:34
2013-09-06 22:21:55
2013-07-23 23:48:12
2013-09-27 13:54:16
2013-08-15 00:00:00
2013-08-15 00:00:00
2013-08-12 19:52:45
2013-09-17 19:47:18
2013-07-25 19:38:21
2013-10-16 18:20:14
2013-07-22 00:41:58
2013-09-13 07:58:51
2013-09-10 05:04:22
2013-09-10 05:04:22
2013-10-14 05:17:05
2013-10-14 05:17:05
2013-07-21 00:46:13
2013-07-31 15:25:12
2013-09-30 08:01:26
2013-09-30 08:01:26
2013-07-20 05:43:58
2013-09-13 07:07:24
2013-09-16 15:17:56
2013-09-16 15:17:56
2013-07-19 01:09:51
2013-10-16 23:51:03
2013-07-19 13:45:14
2013-10-15 14:35:03
2013-10-04 03:25:01
2013-10-09 01:39:22
2013-07-20 02:44:00
2013-10-16 07:26:04
2013-08-12 23:49:39
2013-10-08 01:55:12
2013-09-10 05:04:22
2013-09-10 05:04:22
2013-08-02 03:01:21
2013-10-16 23:35:00
2013-09-10 13:24:36
2013-09-10 13:24:36

1
1
1
1
4
2
3
164
7
1238
4
298
17
7
3
6
2310
258
4
3094
2
1
12
5
99
4
4
21
547
3
598
1
1
20
1
1
8
2
47452
259
3
355
1
4
4
2
12

1
1
1
1
4
2
3
164
7
1238
4
298
17
7
3
6
2310
258
4
3094
2
1
12
5
99
4
4
21
547
3
598
1
1
20
1
1
8
2
47452
259
3
355
1
4
4
2
12

2013-09-04 17:20:48
2013-09-04 17:20:48
2013-08-29 11:58:03
2013-08-29 11:58:03
2013-09-10 00:10:19
2013-09-10 00:10:19
2013-08-23 10:42:20
2013-08-23 10:42:20
2013-07-26 03:05:03
2013-08-23 07:47:25
2013-10-01 02:37:35
2013-10-01 02:37:35
2013-09-03 08:44:03
2013-09-03 08:44:03
2013-07-24 04:44:57
2013-09-05 09:07:48
2013-08-15 20:43:09
2013-10-03 03:02:24
2013-08-30 01:48:08
2013-09-13 09:23:25
2013-07-30 08:36:23
2013-08-19 23:12:52
2013-08-28 00:16:36
2013-09-13 07:36:19
2013-07-23 23:56:25
2013-09-05 02:35:05
2013-07-23 18:12:20
2013-07-25 16:53:04
2013-09-30 16:44:15
2013-09-30 17:31:46
2013-09-03 01:07:40
2013-09-30 06:45:05
2013-07-19 01:38:28
2013-10-16 19:42:20
2013-08-28 00:16:32
2013-09-13 08:46:00
2013-08-27 10:07:49
2013-09-02 08:30:09
2013-07-19 00:14:48
2013-09-13 08:34:06
2013-08-02 17:46:24
2013-08-02 17:46:24
2013-07-24 03:00:17
2013-07-24 03:00:17
2013-08-29 00:47:40
2013-08-29 01:08:32
2013-08-23 14:22:13
2013-10-09 16:48:03
2013-07-20 05:47:18
2013-09-05 01:06:41
2013-07-19 01:09:02
2013-10-01 08:27:01
2013-09-30 08:01:26
2013-10-04 06:04:14
2013-09-13 19:40:37
2013-09-13 19:40:37
2013-07-19 00:18:34
2013-10-16 23:32:51
2013-10-16 13:06:58
2013-10-16 13:09:40
2013-07-19 03:08:09
2013-09-13 07:27:52
2013-07-25 13:50:17
2013-07-25 13:50:17
2013-09-20 20:02:01
2013-09-20 20:02:01
2013-07-23 00:49:51
2013-09-22 18:15:03
2013-09-25 14:35:10
2013-09-25 14:35:10
2013-09-20 19:37:29
2013-09-20 19:37:29
2013-08-20 12:21:34
2013-08-22 18:22:43
2013-08-29 05:05:33
2013-08-29 05:05:33
2013-07-19 00:02:00
2013-10-16 23:58:29
2013-08-28 02:52:46
2013-09-13 08:01:45
2013-08-28 15:14:08
2013-09-19 14:35:08
2013-07-19 05:27:20
2013-09-13 03:33:40
2013-10-09 22:05:31
2013-10-09 22:05:31
2013-07-23 07:30:15
2013-08-02 03:27:43
2013-08-13 11:37:17
2013-09-26 03:29:22
2013-07-29 21:17:30
2013-08-26 17:56:20
2013-07-30 23:51:06
2013-10-10 13:23:12

1
117
3
4
12
3
35
1
2
10
22
1
118
4
27
19
8
2
2
10
64
2
9
8
139
14
78
3
2
4
4
2
8
2
2
6
1
1
76

1
117
3
4
12
3
35
1
2
10
22
1
118
4
27
19
8
2
2
10
64
2
9
8
139
14
78
3
2
4
4
2
8
2
2
6
1
1
76

2013-07-19 20:04:13
2013-07-19 20:04:13
2013-07-22 04:44:50
2013-09-13 08:23:32
2013-08-24 02:18:16
2013-09-15 07:20:42
2013-09-17 11:33:52
2013-10-02 21:52:32
2013-09-03 11:38:41
2013-10-08 12:19:14
2013-09-03 09:20:14
2013-10-02 10:46:24
2013-10-10 14:24:13
2013-10-10 14:24:13
2013-09-12 17:29:22
2013-09-12 17:29:22
2013-09-11 06:25:10
2013-09-11 06:25:10
2013-09-19 13:37:31
2013-10-16 09:01:53
2013-09-03 03:23:32
2013-10-10 07:25:23
2013-08-26 00:00:00
2013-08-26 00:00:00
2013-07-20 01:58:13
2013-10-14 10:17:41
2013-09-15 05:30:00
2013-10-08 10:57:15
2013-07-24 05:47:22
2013-07-24 06:03:39
2013-09-09 02:05:58
2013-09-10 09:18:43
2013-08-08 15:23:54
2013-08-20 22:41:53
2013-08-27 19:21:27
2013-08-28 20:56:20
2013-08-12 19:37:01
2013-08-12 19:37:01
2013-07-23 12:18:50
2013-09-23 01:14:36
2013-07-23 02:17:43
2013-09-06 01:57:43
2013-09-15 09:03:41
2013-09-15 09:03:41
2013-08-27 00:20:24
2013-09-09 23:57:33
2013-08-23 07:52:52
2013-08-23 08:18:02
2013-08-27 01:50:12
2013-09-04 09:04:45
2013-08-21 23:16:30
2013-10-12 02:43:35
2013-07-29 00:07:43
2013-08-21 09:30:23
2013-07-21 08:19:59
2013-08-07 08:05:51
2013-10-14 05:18:29
2013-10-14 05:18:29
2013-07-30 09:50:18
2013-08-01 06:31:30
2013-09-11 08:11:08
2013-09-21 04:45:56
2013-09-13 02:29:58
2013-09-13 02:29:58
2013-07-22 14:23:30
2013-10-07 02:37:26
2013-09-04 05:34:06
2013-09-04 05:34:06
2013-09-09 06:43:57
2013-09-09 06:43:57
2013-10-09 04:52:28
2013-10-09 09:04:57
2013-09-16 17:57:28
2013-09-16 17:57:28
2013-09-10 08:43:06
2013-09-10 08:43:06
2013-07-22 04:59:43
2013-09-13 09:28:51

Type
Attacks
Malware
Spam
P2P
Phish_Host
Bot

Incidents Reports IP Count


146246 146246
103
794
794
13
1712967
1827
2
5121
5121
1
6
6
1
3
3
2

Total

1,865,128

153,988

Spam,
Number
Malware,
1827
Phish_Host
794
, 6 Bot, 3
P2P, 5121

of Reports

105

Attacks,
146246

ber of Reports

Number of IP Addresses Reported


Number of IP Addresses

120

Attacks,
146246

103

100
80
60
40
20
0

13

IP
17.172.232.162
72.21.91.19
54.230.48.145
54.230.48.145
23.45.65.10
96.44.147.186
209.107.220.16
193.182.8.76
63.251.85.33
93.184.216.139
72.21.91.19
157.56.148.23
17.151.140.30
23.66.230.115
74.125.226.231
108.160.165.84
199.27.72.185
74.125.226.242
74.125.22.95
72.21.91.19
8.8.8.8
205.185.204.11
54.230.50.132
64.208.138.104
205.185.204.8
66.155.11.250
93.184.216.139
131.253.40.50
8.8.8.8
209.167.231.15
66.235.138.18
94.245.121.176
108.160.162.53
69.31.132.96
66.117.23.103
72.246.55.35
8.8.8.8
173.194.74.84
207.200.29.91
23.4.37.163
50.31.164.188
192.150.3.160
64.4.11.36
64.4.11.36
173.255.243.189
8.8.8.8

108.160.162.76
74.125.22.95
108.160.162.39
173.194.65.91
208.89.13.133
74.125.226.225
131.253.34.142
107.20.203.158
50.31.164.168
108.160.162.35
199.30.80.32
23.33.187.112
74.125.22.84
8.18.45.80
67.228.177.234
66.235.138.226
23.52.85.163
72.21.81.189
173.194.78.120
17.173.254.11
199.16.156.198
199.59.148.247
199.30.80.32
80.12.96.16
72.21.91.43
178.255.83.1
74.125.226.222
108.160.162.110
173.194.35.47
108.160.165.253
108.160.165.212
108.160.162.108
144.76.113.131
108.160.165.83
207.200.27.85
80.12.96.16
67.228.177.237
17.172.232.145
192.150.3.161
17.172.232.149
23.45.65.11
23.66.230.115
83.145.197.2
173.194.76.125
192.33.31.101
81.18.240.138
67.228.177.236

174.37.236.18
17.171.8.16
108.160.163.38
205.185.204.50
54.235.136.253
77.234.41.82
72.21.91.19
17.172.232.110
17.149.36.186
66.235.138.225
74.125.226.231
54.230.51.218
72.14.246.54
192.150.3.51
108.160.165.211
17.151.16.12
173.194.74.84
69.31.75.185
199.16.156.198
23.33.187.49
65.54.93.143
17.149.36.84
66.117.23.103
8.8.8.8
193.182.8.38
108.160.163.44
17.251.224.40
131.253.40.48
72.21.91.29

Type
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Spam
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Malware
Malware
P2P
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Phish_Host
Attacks
Attacks
Attacks
Attacks
Attacks
Spam
Attacks
Attacks
Attacks

IP
17.172.232.162
72.21.91.19
54.230.48.145
23.45.65.10
96.44.147.186
209.107.220.16
193.182.8.76
63.251.85.33
93.184.216.139
157.56.148.23
17.151.140.30
23.66.230.115
74.125.226.231
108.160.165.84
199.27.72.185
74.125.226.242
74.125.22.95
8.8.8.8
205.185.204.11
54.230.50.132
64.208.138.104
205.185.204.8
66.155.11.250
131.253.40.50
209.167.231.15
66.235.138.18
94.245.121.176
108.160.162.53
69.31.132.96
66.117.23.103
72.246.55.35
173.194.74.84
207.200.29.91
23.4.37.163
50.31.164.188
192.150.3.160
64.4.11.36
173.255.243.189
108.160.162.76
108.160.162.39
173.194.65.91
208.89.13.133
74.125.226.225
131.253.34.142
107.20.203.158
50.31.164.168

Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Attacks
Attacks
Attacks
Attacks

108.160.162.35
199.30.80.32
23.33.187.112
74.125.22.84
8.18.45.80
67.228.177.234
66.235.138.226
23.52.85.163
72.21.81.189
173.194.78.120
17.173.254.11
199.16.156.198
199.59.148.247
80.12.96.16
72.21.91.43
178.255.83.1
74.125.226.222
108.160.162.110
173.194.35.47
108.160.165.253
108.160.165.212
108.160.162.108
144.76.113.131
108.160.165.83
207.200.27.85
67.228.177.237
17.172.232.145
192.150.3.161
17.172.232.149
23.45.65.11
83.145.197.2
173.194.76.125
192.33.31.101
81.18.240.138
67.228.177.236
174.37.236.18
17.171.8.16
108.160.163.38
205.185.204.50
54.235.136.253
77.234.41.82
17.172.232.110
17.149.36.186
66.235.138.225
54.230.51.218
72.14.246.54
192.150.3.51

Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Bot
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Malware
Attacks
Malware
Attacks
Attacks
Attacks
Malware
Bot
Attacks
Attacks
Attacks
Attacks
Attacks

108.160.165.211
17.151.16.12
69.31.75.185
23.33.187.49
65.54.93.143
17.149.36.84
193.182.8.38
108.160.163.44
17.251.224.40
131.253.40.48
72.21.91.29

IP
Total Reports
8.8.8.8
199.59.148.247
72.21.91.19
50.31.164.168
178.255.83.1
64.4.11.36
108.160.162.53
50.31.164.188
199.30.80.32
66.235.138.18
93.184.216.139
131.253.40.50
131.253.34.142
208.89.13.133
66.117.23.103
63.251.85.33
108.160.165.83
108.160.165.212
108.160.165.211
108.160.162.76
108.160.165.84
66.155.11.250
192.150.3.161
209.167.231.15
192.150.3.160
17.173.254.11
192.150.3.51
205.185.204.8
131.253.40.48
17.149.36.84
17.172.232.145
72.21.81.189
23.66.230.115
17.151.140.30
107.20.203.158
17.172.232.110
17.172.232.149
174.37.236.18
192.33.31.101
173.194.35.47
173.194.78.120
17.172.232.162
17.149.36.186
199.27.72.185
108.160.162.35
108.160.163.38

IP
99884
17846
13140
3303
3109
2062
1884
1293
1292
1166
873
847
787
597
435
367
317
316
280
276
269
260
258
250
195
193
164
154
141
117
114
112
112
100
99
96
94
91
90
90
89
88
78
74
52
51

74.125.226.231
173.194.74.84
74.125.226.225
193.182.8.38
193.182.8.76
173.255.243.189
207.200.29.91
108.160.162.110
108.160.162.39
83.145.197.2
80.12.96.16
54.230.48.145
81.18.240.138
74.125.22.95
108.160.162.108
66.235.138.225
207.200.27.85
108.160.163.44
66.235.138.226
17.251.224.40
96.44.147.186
209.107.220.16
54.230.50.132
64.208.138.104
67.228.177.234
67.228.177.236
17.151.16.12
23.33.187.112
8.18.45.80
144.76.113.131
94.245.121.176
67.228.177.237
54.235.136.253
23.4.37.163
199.16.156.198
72.21.91.29
108.160.165.253
173.194.76.125
69.31.132.96
17.171.8.16
23.45.65.10
157.56.148.23
77.234.41.82
72.14.246.54
72.246.55.35
23.33.187.49
205.185.204.11

38
36
30
27
24
24
23
21
21
20
18
17
15
12
11
10
10
9
8
8
8
8
7
7
6
6
5
5
4
4
4
4
3
3
3
3
2
2
2
2
2
2
2
2
1
1
1

173.194.65.91
74.125.226.222
205.185.204.50
69.31.75.185
54.230.51.218
74.125.226.242
74.125.22.84
72.21.91.43
23.52.85.163
23.45.65.11
65.54.93.143

1
1
1
1
1
1
1
1
1
1
1

1%
Most Often1%Reported
1%IP Addresses
1%
2%

1%

1%

8.8.8.8

199.59.148.247

72.21.91.19

50.31.164.168

178.255.83.1

64.4.11.36

108.160.162.53

50.31.164.188

199.30.80.32

66.235.138.18

2%

9%

12%

69%

93.184.216.139

Details
No DNS authority records for the query and it has a DNS time-to-live of 1.
Evasive Traffic Detection
Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Memory Corruption
Generic DNS Cache Corruption (Query ID's) Attack
Generic Corrupted Icon File Event
Microsoft Windows Embedded Open Type Font Malformed Name Table Attack
Generic Javascript Obfuscation Attack
Out-of-Sequence TCP RST Packet
Adobe Acrobat and Reader CoolType.dll Remote DoS Attack
DirectShow Overflow Attack
Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
Generic TCP Sequence Number Approximation in BGP Attack
Oracle Secure Backup 'observice.exe' Remote Code Execution Attack
No Content Length HTTP Response
Adobe Flash Player InitArray Memory Corruption Attack
DNS Response containing Private (RFC 1918) address
Generic HTTP request method unknown
Mozilla Firefox Error Page Address Bar URI Spoofing Attack
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
HTTP MSIE CSS File Memory Corruption
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Vulnerability
Oracle Java Hotspot Sub-component CVE-2012-1723 Remote Code Execution Vulnerability
Microsoft ISA Server HTTP Request Smuggling Attack
Generic Non-Printable character in SIP header event
TCP Bad Segment Detected
Clickjacking Attack Via CSS Pointer-Event
Generic Cross-site scripting (XSS) Attack
Malicious iframe Image Request
Microsoft Windows Embedded OpenType Font Engine Remote Code Execution Vulnerability
Adobe Acrobat and Reader CVE-2011-0602 Image Parsing RCE
Data Send After TCP Reset
Sweet Orange Exploit Kit Website
Microsoft Windows Media Player Plugin Buffer Overflow Attack
Apple iTunes AAC File Parsing Integer Overflow Vulnerability
libpng Memory Corruption and Memory Leak Vulnerabilities
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
Microsoft IE CreateTextRange Remote Code Execution Vulnerability
Kaspersky Antivirus cab heap overflow
Internet Explorer CSS Strings Memory Corruption Vulnerability
POLICY Adobe PDF header obfuscation
Generic TCP Small Segment Attack
Adobe Flash Cross-site Scripting Attack
Binary Shellcode NOOP Attack
Microsoft Internet Explorer 'iepeers.dll' RCE Attack
Generic Malicious Site Request detected

BitDefender Internet Security 2009 File Name XSS Vulnerability


Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Attack
Generic ICMP Echo Unexpected Reply
Microsoft Windows DNS Server NAPTR Query Remote Code Execution Vulnerability
Microsoft IE Layout Handling Use After Free Remote Memory Corruption Vulnerability
Generic HTTP Referrer Tag in HTML Event
Adobe Flash SWF Plugin Code Exec
Cisco IOS DHCP Input Queue Blocking Denial Of Service Attack
Oracle Java readMabCurveData() BO
Microsoft GDI+ PNG File Processing Remote Code Execution Vulnerability
JRE Deployment Toolkit ActiveX Control Multiple BO
Generic X86 Buffer Overflow (stealth NOP) Attack
Microsoft Windows DNS Client Buffer Overrun attempt
Microsoft MDAC Function Broadcast Response Buffer Overrun Attack
Heap Spray Characters Detected
Generic HTTP URI Possible Evasion Attack
TCP Zero Length
Generic VoIP suspicious traffic
Microsoft Internet Explorer Marquee Tag Handling RCE Vulnerability
Microsoft IE and Mozilla Firefox URI Handler Command Injection Attack
Mozilla Browser Non-ASCII Hostname Heap Overflow Attack
libxml XML Entity Name Heap Buffer Overflow Vulnerability
Facebook Fake Survey Manual Sharing
Suspicious Executable Image Attack
Apple QuickTime Information Disclosure and Multiple Code Execution Vulnerabilities
Microsoft Malformed PNG File Code Execution and Overflow attack
HTML Script Extension Evasion
LibPNG Graphics Library Multiple Remote Attack
Generic URI Display Obfuscation Attack
Generic Windows Executable File HTTP Download
Microsoft Windows Kodak Image Viewer Remote Code Execution Vulnerability
Generic file URI scheme
Microsoft Windows Image Color Management Remote Code Execution Vulnerability
g01pack Toolkit Attack
Oracle Misparsed Login Response
Generic X86 Buffer Overflow (setgid(0) ) Attack
ht://dig Arbitrary File Inclusion or Disclosure Attack
Microsoft Internet Explorer DHTML Object Race Condition Memory Corruption
Multi-exploit web attack toolkit
Adobe Flash Player Multimedia File Remote Buffer Overflow
IOS Stack Group Bidding Protocol DoS Attack
Microsoft DirectX DirectShow QuickTime Video Remote Code Execution Vulnerability
Microsoft Malware Protection Engine Disk Space Exhaustion Remote DoS Vulnerability

Reports
47452
41313
37691
8449
2637
1793
1528
1006
773
704
547
484
355
326
161
143
92
63
49
42
42
41
37
34
30
29
25
23
20
20
20
19
18
18
17
17
14
12
12
11
10
10
10
9
8
7

Most Commonly Reported Events


1% 1%
1% 0% 0%
2% 1%

No DNS authority records for the query and it h


DNS time-to-live of 1.
Evasive Traffic Detection

Microsoft Forefront Threat Management Gatew


(TMG) Firewall Client Memory Corruption
Generic DNS Cache Corruption (Query ID's) Atta

6%
33%

Generic Corrupted Icon File Event

Microsoft Windows Embedded Open Type Font


Malformed Name Table Attack
Generic Javascript Obfuscation Attack

26%

Out-of-Sequence TCP RST Packet

Adobe Acrobat and Reader CoolType.dll Remot


DoS Attack
DirectShow Overflow Attack
29%

Microsoft Windows SMTP Server MX Record De


of Service Vulnerability

6
6
6
6
5
5
5
5
4
4
4
4
4
4
4
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1

ecords for the query and it has a

t Threat Management Gateway


nt Memory Corruption
Corruption (Query ID's) Attack

Icon File Event

s Embedded Open Type Font


Table Attack
Obfuscation Attack

CP RST Packet

d Reader CoolType.dll Remote

s SMTP Server MX Record Denial

Description
Evasive Traffic Detection
Malicious iframe Image Request
Generic Corrupted Icon File Event
HTTP MSIE CSS File Memory Corruption
libxml XML Entity Name Heap Buffer Overflow Vulnerability
Oracle Misparsed Login Response
No Content Length HTTP Response
Generic Javascript Obfuscation Attack
Generic Cross-site scripting (XSS) Attack
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
DirectShow Overflow Attack
Facebook Fake Survey Manual Sharing
Apple iTunes AAC File Parsing Integer Overflow Vulnerability
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
Clickjacking Attack Via CSS Pointer-Event
Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Vulnerability
Oracle Java readMabCurveData() BO
POLICY Adobe PDF header obfuscation
Microsoft Internet Explorer 'iepeers.dll' RCE Attack
Generic X86 Buffer Overflow (setgid(0) ) Attack
Out-of-Sequence TCP RST Packet
Microsoft IE Layout Handling Use After Free Remote Memory Corruption Vulnerability
Generic HTTP request method unknown
Sweet Orange Exploit Kit Website
ht://dig Arbitrary File Inclusion or Disclosure Attack
BitDefender Internet Security 2009 File Name XSS Vulnerability
Microsoft Windows Media Player Plugin Buffer Overflow Attack
Generic HTTP Referrer Tag in HTML Event
Microsoft Windows Embedded Open Type Font Malformed Name Table Attack
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Attack
Suspicious Executable Image Attack
Generic HTTP URI Possible Evasion Attack
Microsoft IE CreateTextRange Remote Code Execution Vulnerability
Apple QuickTime Information Disclosure and Multiple Code Execution Vulnerabilities
Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Memory Corruptio
TCP Bad Segment Detected
Oracle Java Hotspot Sub-component CVE-2012-1723 Remote Code Execution Vulnerability
Generic ICMP Echo Unexpected Reply
Microsoft Malformed PNG File Code Execution and Overflow attack
TCP Zero Length
Microsoft GDI+ PNG File Processing Remote Code Execution Vulnerability
Internet Explorer CSS Strings Memory Corruption Vulnerability
HTML Script Extension Evasion
libpng Memory Corruption and Memory Leak Vulnerabilities
Generic TCP Sequence Number Approximation in BGP Attack

LibPNG Graphics Library Multiple Remote Attack


Oracle Secure Backup 'observice.exe' Remote Code Execution Attack
Microsoft Windows Embedded OpenType Font Engine Remote Code Execution Vulnerability
Microsoft ISA Server HTTP Request Smuggling Attack
Microsoft Internet Explorer DHTML Object Race Condition Memory Corruption
Adobe Acrobat and Reader CVE-2011-0602 Image Parsing RCE
Multi-exploit web attack toolkit
JRE Deployment Toolkit ActiveX Control Multiple BO
Adobe Flash SWF Plugin Code Exec
Generic TCP Small Segment Attack
Generic Non-Printable character in SIP header event
Mozilla Firefox Error Page Address Bar URI Spoofing Attack
Generic VoIP suspicious traffic
Generic URI Display Obfuscation Attack
Generic X86 Buffer Overflow (stealth NOP) Attack
DNS Response containing Private (RFC 1918) address
Adobe Acrobat and Reader CoolType.dll Remote DoS Attack
Adobe Flash Player Multimedia File Remote Buffer Overflow
Microsoft Windows DNS Client Buffer Overrun attempt
Microsoft Internet Explorer Marquee Tag Handling RCE Vulnerability
Generic Windows Executable File HTTP Download
Adobe Flash Player InitArray Memory Corruption Attack
Microsoft IE and Mozilla Firefox URI Handler Command Injection Attack
Microsoft Windows DNS Server NAPTR Query Remote Code Execution Vulnerability
Generic Malicious Site Request detected
Microsoft Windows Kodak Image Viewer Remote Code Execution Vulnerability
Generic DNS Cache Corruption (Query ID's) Attack
Adobe Flash Cross-site Scripting Attack
Binary Shellcode NOOP Attack
Generic file URI scheme
Mozilla Browser Non-ASCII Hostname Heap Overflow Attack
Microsoft MDAC Function Broadcast Response Buffer Overrun Attack
IOS Stack Group Bidding Protocol DoS Attack
Cisco IOS DHCP Input Queue Blocking Denial Of Service Attack
Heap Spray Characters Detected
Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
Microsoft DirectX DirectShow QuickTime Video Remote Code Execution Vulnerability
No DNS authority records for the query and it has a DNS time-to-live of 1.
Microsoft Windows Image Color Management Remote Code Execution Vulnerability
Kaspersky Antivirus cab heap overflow
Data Send After TCP Reset
g01pack Toolkit Attack
Microsoft Malware Protection Engine Disk Space Exhaustion Remote DoS Vulnerability

coding UTF-8

vasion Vulnerability

ruption Vulnerability

Table Attack

erflow Attack

tion Vulnerabilities
Client Memory Corruption

e Execution Vulnerability

de Execution Vulnerability

ry Corruption

tion Vulnerability

Vulnerability

cution Vulnerability

ution Vulnerability

ote DoS Vulnerability

Details
IPs
Evasive Traffic Detection
61
Out-of-Sequence TCP RST Packet
30
No Content Length HTTP Response
20
Generic HTTP request method unknown
16
Microsoft Internet Explorer CryptoAPI Common Name Spoofing Attack
11
DirectShow Overflow Attack
10
Generic Javascript Obfuscation Attack
8
Generic TCP Timestamp PAWS Remote Denial Of Service Attack
8
Bare byte encoding uses non-ASCII characters as valid values in decoding UTF-8
6
Adobe Flash Player InitArray Memory Corruption Attack
6
Clickjacking Attack Via CSS Pointer-Event
4
Multiple Vendor Antivirus Products Malformed ZIP Archive Scan Evasion Vulnerability 4
libpng Memory Corruption and Memory Leak Vulnerabilities
4
Generic TCP Small Segment Attack
4
Generic Corrupted Icon File Event
3
Generic Cross-site scripting (XSS) Attack
3
Apple iTunes AAC File Parsing Integer Overflow Vulnerability
3
TCP Bad Segment Detected
3
libxml XML Entity Name Heap Buffer Overflow Vulnerability
2
Facebook Fake Survey Manual Sharing
2
Microsoft Internet Explorer 'iepeers.dll' RCE Attack
2
Microsoft Windows Media Player Plugin Buffer Overflow Attack
2
Generic HTTP Referrer Tag in HTML Event
2
Suspicious Executable Image Attack
2
Oracle Java Hotspot Sub-component CVE-2012-1723 Remote Code Execution Vulnerability
2
Microsoft Malformed PNG File Code Execution and Overflow attack
2
Microsoft GDI+ PNG File Processing Remote Code Execution Vulnerability
2
Internet Explorer CSS Strings Memory Corruption Vulnerability
2
Microsoft ISA Server HTTP Request Smuggling Attack
2
Adobe Acrobat and Reader CVE-2011-0602 Image Parsing RCE
2
JRE Deployment Toolkit ActiveX Control Multiple BO
2
Adobe Flash SWF Plugin Code Exec
2
Generic VoIP suspicious traffic
2
Adobe Acrobat and Reader CoolType.dll Remote DoS Attack
2
Binary Shellcode NOOP Attack
2
Malicious iframe Image Request
1
HTTP MSIE CSS File Memory Corruption
1
Oracle Misparsed Login Response
1
Oracle Java readMabCurveData() BO
1
POLICY Adobe PDF header obfuscation
1
Generic X86 Buffer Overflow (setgid(0) ) Attack
1
Microsoft IE Layout Handling Use After Free Remote Memory Corruption Vulnerability 1
Sweet Orange Exploit Kit Website
1
ht://dig Arbitrary File Inclusion or Disclosure Attack
1
BitDefender Internet Security 2009 File Name XSS Vulnerability
1
Microsoft Windows Embedded Open Type Font Malformed Name Table Attack
1

65
64
63
62
61
60
59
58
57
56
55
54
53
52
51
50
49
48
47
46
45
44
43
42
41
40
39
38
37
36
35
34
33
32
31
30
29
28
27
26
25
24
23
22
21
20
19
18
17
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
0

Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Attack


1
Generic HTTP URI Possible Evasion Attack
1
Microsoft IE CreateTextRange Remote Code Execution Vulnerability
1
Apple QuickTime Information Disclosure and Multiple Code Execution Vulnerabilities 1
Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Memory Corruption
1
Generic ICMP Echo Unexpected Reply
1
TCP Zero Length
1
HTML Script Extension Evasion
1
Generic TCP Sequence Number Approximation in BGP Attack
1
LibPNG Graphics Library Multiple Remote Attack
1
Oracle Secure Backup 'observice.exe' Remote Code Execution Attack
1
Microsoft Windows Embedded OpenType Font Engine Remote Code Execution Vulnerability
1
Microsoft Internet Explorer DHTML Object Race Condition Memory Corruption
1
Multi-exploit web attack toolkit
1
Generic Non-Printable character in SIP header event
1
Mozilla Firefox Error Page Address Bar URI Spoofing Attack
1
Generic URI Display Obfuscation Attack
1
Generic X86 Buffer Overflow (stealth NOP) Attack
1
DNS Response containing Private (RFC 1918) address
1
Adobe Flash Player Multimedia File Remote Buffer Overflow
1
Microsoft Windows DNS Client Buffer Overrun attempt
1
Microsoft Internet Explorer Marquee Tag Handling RCE Vulnerability
1
Generic Windows Executable File HTTP Download
1
Microsoft IE and Mozilla Firefox URI Handler Command Injection Attack
1
Microsoft Windows DNS Server NAPTR Query Remote Code Execution Vulnerability
1
Generic Malicious Site Request detected
1
Microsoft Windows Kodak Image Viewer Remote Code Execution Vulnerability
1
Generic DNS Cache Corruption (Query ID's) Attack
1
Adobe Flash Cross-site Scripting Attack
1
Generic file URI scheme
1
Mozilla Browser Non-ASCII Hostname Heap Overflow Attack
1
Microsoft MDAC Function Broadcast Response Buffer Overrun Attack
1
IOS Stack Group Bidding Protocol DoS Attack
1
Cisco IOS DHCP Input Queue Blocking Denial Of Service Attack
1
Heap Spray Characters Detected
1
Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
1
Microsoft DirectX DirectShow QuickTime Video Remote Code Execution Vulnerability 1
No DNS authority records for the query and it has a DNS time-to-live of 1.
1
Microsoft Windows Image Color Management Remote Code Execution Vulnerability
1
Kaspersky Antivirus cab heap overflow
1
Data Send After TCP Reset
1
g01pack Toolkit Attack
1
Microsoft Malware Protection Engine Disk Space Exhaustion Remote DoS Vulnerability 1

Number of IP Addresses Reported Per Event


Evasive Traffic Detection
Out-of-Sequence TCP RST Packet
No Content Length HTTP Response
Generic HTTP request method unknown
Microsoft Internet Explorer CryptoAPI
Common Name Spoofing Attack
DirectShow Overflow Attack
Generic Javascript Obfuscation Attack
Generic TCP Timestamp PAWS Remote
Denial Of Service Attack
Bare byte encoding uses non-ASCII
characters as valid values in decoding UTF8
Adobe Flash Player InitArray Memory
Corruption Attack

Spammers
72.21.91.19
64.4.11.36

Reports

Spam Emails
other reports(ALL)
2
2
13138
1825 1712965 -1712965

0
0
0
0
0
0
0
0
0
0
0
0
0
others

1711140

72.21.91.19
64.4.11.36

10

Reports
Spam Emails

100

1000

10000

100000

Spam Reports - Logarithmic Scale

1000000

10000000

Phishing IPs
8.8.8.8

Reports
6

Most Often Reported Phishing


0%
0%
0%
0%
0%
0%

100%

Reported Phishing IP Addresses


0%
0%
0%
0%
0%

8.8.8.8

100%

Detection Type
Reported Incidents
Reported IP Addreses
Phishing Site targeting http
4
1
Phishing Site targeting paypal.com1
1
Phishing Site targeting apple.com1
1
Phishing Site targeting http

Phishing Site targeting paypal.com

Phishing Site targeting apple.com

0
Reported Incidents

0.5

Reported Incidents

1.5

2.5

Reported IP Addreses

3.5

4.5

Bots
72.21.91.19
8.8.8.8

Incidents Percentage
2
66.67%
1
33.33%

2.5

Bot Reports

1.5

0.5

0
72.21.91.19
8.8.8.8

Others
Total

0
3

0.00%

Detection Type
Generic Bot detection

Reported Incidents
Reported IP addresses
3
2
Generic Bot detection

eneric Bot detection

0.5

Reported Incidents

1.5

Reported IP addresses

2.5

3.5

205.185.204.8
205.185.204.11
205.185.204.50
205.251.251.248
207.200.27.85
207.200.29.91
207.200.35.236
208.89.12.149
208.89.13.68
208.89.13.133
208.111.131.152
209.99.109.19
209.107.220.9
209.107.220.16
209.107.220.25
209.107.220.35
209.167.231.15
216.196.118.239
216.196.118.240
217.149.52.196
0.0.0.0
1.1.1.1
4.59.136.203
4.59.136.213
4.68.110.225
4.69.140.90
8.8.8.8
8.18.45.80
10.10.8.1
10.10.8.233
10.20.1.49
17.149.34.140
17.149.34.141
17.149.34.142
17.149.36.84
17.149.36.186
17.151.16.12
17.151.140.30
17.167.138.45
17.171.8.16
17.172.100.43
17.172.208.53
17.172.232.8
17.172.232.9
17.172.232.145
17.172.232.149
17.172.232.162
17.173.254.11
17.173.254.222
17.173.254.223

17.251.224.40
17.251.224.83
23.1.224.66
23.3.162.217
23.3.163.146
23.3.173.15
23.4.37.163
23.4.43.27
23.6.86.35
23.6.92.91
23.7.209.193
23.10.237.15
23.21.73.85
23.30.206.234
23.33.187.43
23.33.187.49
23.33.187.112
23.45.65.10
23.45.65.11
23.46.177.193
23.52.81.193
23.52.85.163
23.52.91.27
23.66.230.115
23.199.45.29
23.199.243.159
23.199.253.15
23.200.12.91
23.204.173.15
31.13.73.81
31.13.73.97
50.31.149.100
50.31.164.168
50.31.164.188
50.97.40.233
50.204.238.117
54.221.232.65
54.227.154.22
54.230.48.19
54.230.48.76
54.230.48.134
54.230.48.145
54.230.50.20
54.230.50.67
54.230.50.132
54.230.51.218
54.230.206.86
54.230.207.67
54.235.136.253
54.236.99.56

54.236.140.81
54.240.250.33
54.245.104.66
63.251.85.33
64.4.11.36
64.208.138.104
65.54.92.150
65.54.93.143
66.117.23.103
66.155.11.250
66.235.138.18
66.235.138.193
66.235.138.195
66.235.138.225
66.235.138.226
66.235.139.205
66.235.139.207
67.135.105.130
67.228.177.234
67.228.177.236
67.228.177.237
68.67.152.178
68.85.106.197
68.86.83.118
68.86.85.93
68.86.88.234
68.86.89.174
68.86.90.57
68.86.231.193
69.24.34.147
69.24.45.19
69.31.75.185
69.31.132.96
72.14.246.54
72.21.81.189
72.21.91.19
72.21.91.29
72.21.91.43
74.125.22.84
74.125.22.95
74.125.226.0
74.125.226.1
74.125.226.2
74.125.226.3
74.125.226.4
74.125.226.5
74.125.226.6
74.125.226.7
74.125.226.8
74.125.226.9

74.125.226.10
74.125.226.11
74.125.226.12
74.125.226.13
74.125.226.14
74.125.226.15
74.125.226.16
74.125.226.17
74.125.226.18
74.125.226.19
74.125.226.20
74.125.226.25
74.125.226.26
74.125.226.28
74.125.226.30
74.125.226.222
74.125.226.225
74.125.226.231
74.125.226.240
74.125.226.242
74.205.108.15
74.205.108.31
74.205.108.54
74.205.108.56
74.209.219.102
75.126.194.98
75.126.194.99
77.234.40.91
77.234.41.81
77.234.41.82
77.234.44.39
80.12.96.16
80.12.96.59
81.18.240.138
83.145.197.2
93.184.216.139
94.245.121.176
96.17.88.143
96.44.147.186
97.74.55.230
98.129.84.149
107.20.203.158
107.21.216.177
107.23.188.100
108.160.162.35
108.160.162.39
108.160.162.53
108.160.162.76
108.160.162.108
108.160.162.110

108.160.163.38
108.160.163.44
108.160.165.8
108.160.165.10
108.160.165.11
108.160.165.61
108.160.165.83
108.160.165.84
108.160.165.138
108.160.165.189
108.160.165.211
108.160.165.212
108.160.165.253
108.160.166.9
108.160.166.10
108.160.166.11
108.160.166.13
108.160.166.61
108.160.166.137
108.160.166.138
108.160.166.139
108.160.166.189
108.161.187.128
131.253.34.142
131.253.40.48
131.253.40.50
143.127.10.57
144.76.113.131
157.55.211.12
157.56.148.23
162.222.96.155
165.254.57.131
165.254.138.18
173.194.35.47
173.194.46.111
173.194.65.91
173.194.76.125
173.194.78.120
173.194.126.239
173.243.0.160
173.255.243.189
174.37.236.18
174.143.25.229
178.255.83.1
184.28.193.29
184.169.179.97
192.33.31.101
192.150.3.51
192.150.3.160
192.150.3.161

192.168.0.127
192.168.1.7
192.168.1.10
192.168.1.13
192.168.1.38
192.168.1.58
192.168.1.247
192.168.5.133
192.168.5.137
192.168.5.139
192.168.49.69
192.168.253.253
193.182.8.38
193.182.8.112
193.235.32.147
198.8.70.115
198.8.70.232
198.51.152.82
199.15.213.27
199.16.156.198
199.16.156.200
199.27.72.185
199.30.80.32
199.59.148.247

También podría gustarte