[][src]Enum abuseipdb::Category

#[repr(u8)]
pub enum Category {
    FraudOrder,
    DdosAttack,
    FtpBruteForce,
    PingOfDeath,
    Phishing,
    FraudVoip,
    OpenProxy,
    WebSpam,
    EmailSpam,
    BlogSpam,
    VpnIp,
    PortScan,
    Hacking,
    SqlInjection,
    Spoofing,
    BruteForceCredential,
    BadWebBot,
    ExploitedHost,
    WebAppAttack,
    SshAbuse,
    IotTargeted,
}

AbuseIPDB attack categories.

Variants

FraudOrder

Fraudulent orders.

DdosAttack

Participating in distributed denial-of-service (usually part of botnet).

FtpBruteForce

FTP Brute-Force

PingOfDeath

Oversized IP packet.

Phishing

Phishing websites and/or email.

FraudVoip

Fraud VoIP

OpenProxy

Open proxy, open relay, or Tor exit node.

WebSpam

Comment/forum spam, HTTP referer spam, or other CMS spam.

EmailSpam

Spam email content, infected attachments, and phishing emails. Note: Limit comments to only relevent information (instead of log dumps) and be sure to remove PII if you want to remain anonymous.

BlogSpam

CMS blog comment spam.

VpnIp

VPN IP - Conjunctive category.

PortScan

Scanning for open ports and vulnerable services.

Hacking

Hacking

SqlInjection

Attempts at SQL injection.

Spoofing

Email sender spoofing.

BruteForceCredential

Brute-force attacks on webpage logins and services like SSH, FTP, SIP, SMTP, RDP, etc. This category is seperate from DDoS attacks.

BadWebBot

Webpage scraping (for email addresses, content, etc) and crawlers that do not honor robots.txt. Excessive requests and user agent spoofing can also be reported here.

ExploitedHost

Host is likely infected with malware and being used for other attacks or to host malicious content. The host owner may not be aware of the compromise. This category is often used in combination with other attack categories.

WebAppAttack

Attempts to probe for or exploit installed web applications such as a CMS like WordPress/Drupal, e-commerce solutions, forum software, phpMyAdmin and various other software plugins/solutions.

SshAbuse

Secure Shell (SSH) abuse. Use this category in combination with more specific categories.

IotTargeted

Abuse was targeted at an "Internet of Things" type device. Include information about what type of device was targeted in the comments.

Trait Implementations

impl Clone for Category[src]

impl PartialEq<Category> for Category[src]

impl Debug for Category[src]

impl StructuralPartialEq for Category[src]

impl Serialize for Category[src]

impl<'de> Deserialize<'de> for Category[src]

Auto Trait Implementations

Blanket Implementations

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> From<T> for T[src]

impl<T> ToOwned for T where
    T: Clone
[src]

type Owned = T

The resulting type after obtaining ownership.

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = !

The type returned in the event of a conversion error.

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> DeserializeOwned for T where
    T: Deserialize<'de>, 
[src]