# Log4Shell(CVE-2021-44228)related attacks IOCs
源IP使用Apache Log4j RCE尝试攻击,其中包含很大部分Tor节点,详见[Attack-IP.md](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs/blob/main/Attack-IP.md)
利用log4j漏洞传播的恶意程序、Botnet等IOC详见[IOC-C2.md](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs/blob/main/IOC-C2.md)
Snort检测规则详见[Snort.md](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs/blob/main/Snort.md)
Suricata规则详见[Suricata.md](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs/blob/main/Suricata.md)
[4.0K] /data/pocs/1f404e912e1c2e136feeea1941e738294165f6a2
├── [ 41K] Attack-IP.md
├── [ 11K] IOC-C2.md
├── [ 678] README.md
├── [ 12K] Snort.md
└── [ 12K] Suricata.md
0 directories, 5 files