Baric's knowledge Base
search
Ctrlk
  • Baric
  • Security Programs
    • OSINTchevron-right
    • Security FrameWorkschevron-right
    • Threat Huntingchevron-right
    • Shellschevron-right
    • Reverse Engineeringchevron-right
    • Phishingchevron-right
    • Browser Toolschevron-right
    • Mobilechevron-right
    • Audit and Scannerschevron-right
    • Windowschevron-right
    • Bug Bountychevron-right
    • Privacychevron-right
    • Useful Online Linkschevron-right
    • Spiders and Scraperschevron-right
    • HoneyPotschevron-right
    • Command and Controlchevron-right
    • Antiviruschevron-right
  • Development
    • Linux tool list
    • BOF and Coff Executerschevron-right
    • Code Scannerschevron-right
    • Databaseschevron-right
    • Dockerchevron-right
    • API and Scraping Sourceschevron-right
    • Microsoft KQLchevron-right
    • AD PS Commandschevron-right
    • HomeLabchevron-right
    • Compliancechevron-right
    • Siems and EDRchevron-right
      • Splunkchevron-right
      • Wazuhchevron-right
      • Gravwellchevron-right
      • OpenEDR
      • Data for SIEMchevron-right
        • IP from Companieschevron-right
        • VPN IPchevron-right
        • IP Block-Listschevron-right
        • Malicious User Agentschevron-right
          • User Agents
        • Proofpoint Emerging Threats Rules
    • Graphing Toolschevron-right
    • Website Devchevron-right
    • Lanuageschevron-right
    • GitHubchevron-right
    • Gamingchevron-right
    • Cursor AI code editor
    • IOS jailbreakingchevron-right
    • Fun Internet findschevron-right
  • IT Help
    • Windowschevron-right
    • Mobilechevron-right
    • Programschevron-right
    • Networkingchevron-right
    • Resume toolschevron-right
  • Security Education
    • Monthly Security topics Outline
    • Do not call number spam
    • Gameschevron-right
    • Sec Newschevron-right
    • Online Learningchevron-right
    • Comics
    • Communitieschevron-right
    • Videoschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Development chevron-right
  2. Siems and EDRchevron-right
  3. Data for SIEM

Malicious User Agents

Normal Device User Agents

Logo2025: List of User-Agent stringsDeviceAtlaschevron-right

Bad User Agents

Logoawesome-lists/Lists/suspicious_http_user_agents_list.csv at main · mthcht/awesome-listsGitHubchevron-right
PreviousEmerging Threats IP Blockingchevron-leftNextUser Agentschevron-right

Last updated 9 months ago