ESR series service routers.ESR-Series. User manual
https://
rules.emergingthreats.net/
open/suricata/rules/
botcc.rules
These rules describe well-known botnets and control servers. Sources:
Shadowserver.org, Zeus Tracker, Palevo Tracker, Feodo Tracker, Ransomware
Tracker.
https://
rules.emergingthreats.net/
open/suricata/rules/
ciarmy.rules
These rules describe malicious hosts by the classification of the www.cinsarmy.com
project.
https://
rules.emergingthreats.net/
open/suricata/rules/
compromised.rules
These rules describe well-known compromised and malicious hosts. Sources: Daniel
Gerzo’s BruteForceBlocker, The OpenBL, Emerging Threats Sandnet, SidReporter
Projects.
https://
rules.emergingthreats.net/
open/suricata/rules/drop.rules
These rules describe spammer hosts/networks by the classification of the
www.spamhaus.org project.
https://
rules.emergingthreats.net/
open/suricata/rules/
dshield.rules
These rules describe malicious hosts by the classification of the www.dshield.org
project.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
activex.rules
These rules contain signatures for using ActiveX content.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
attack_response.rules
Rules that detect host behavior after successful attacks.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
chat.rules
These rules describe signs of accessing popular chat rooms.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
current_events.rules
Temporary rules awaiting possible inclusion in permanent rule lists.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
dns.rules
These rules contain signatures of vulnerabilities in the DNS protocol, signs of the use
of DNS by malware, and incorrect use of the DNS protocol.