- 1: DNS Compromise
- 2: DNS Poisoning
- 3: Fraud Orders
- 4: DDoS Attack
- 5: Open Proxy
- 6: Web Spam
- 7: Email Spam
- 8: Port Scan
- 9: Spoofing
- 10: Brute Force
- 11: Bad Web Bot
- 12: Exploited Host
- 13: Web App Attack
- 14: SSH
- 15: IoT Targeted
- 16: FTP Brute Force
- 17: Ping of Death
- 18: Phishing
- 19: Fraud VoIP
- 20: Blog Spam
- 21: VPN IP
- 22: Hacking
- 23: SQL Injection
- 24: Ignoring robots.txt