• 1: DNS Compromise
  • 2: DNS Poisoning
  • 3: Fraud Orders
  • 4: DDoS Attack
  • 5: Open Proxy
  • 6: Web Spam
  • 7: Email Spam
  • 8: Port Scan
  • 9: Spoofing
  • 10: Brute Force
  • 11: Bad Web Bot
  • 12: Exploited Host
  • 13: Web App Attack
  • 14: SSH
  • 15: IoT Targeted
  • 16: FTP Brute Force
  • 17: Ping of Death
  • 18: Phishing
  • 19: Fraud VoIP
  • 20: Blog Spam
  • 21: VPN IP
  • 22: Hacking
  • 23: SQL Injection
  • 24: Ignoring robots.txt