Snort 3.0 is here!

Upgrade to experience a slew of new features and improvements.

What is Snort?

Snort is the foremost Open Source Intrusion Prevention System (IPS) in the world. Snort IPS uses a series of rules that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for users.

Snort can be deployed inline to stop these packets, as well. Snort has three primary uses: As a packet sniffer like tcpdump, as a packet logger — which is useful for network traffic debugging, or it can be used as a full-blown network intrusion prevention system. Snort can be downloaded and configured for personal and business use alike.

What are my options for buying and using Snort?

Once downloaded and configured, Snort rules are distributed in two sets: The “Community Ruleset” and the “Snort Subscriber Ruleset.”

The Snort Subscriber Ruleset is developed, tested, and approved by Cisco Talos. Subscribers to the Snort Subscriber Ruleset will receive the ruleset in real-time as they are released to Cisco customers. You can download the rules and deploy them in your network through the Snort.org website. The Community Ruleset is developed by the Snort community and QAed by Cisco Talos. It is freely available to all users.

For more information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Step 1

Find the appropriate package for your operating system and install.

wget https://snort.org/downloads/snort/daq-2.0.7.tar.gz
                      
wget https://snort.org/downloads/snort/snort-2.9.18.tar.gz
tar xvzf daq-2.0.7.tar.gz
                      
cd daq-2.0.7
./configure && make && sudo make install
tar xvzf snort-2.9.18.tar.gz
                      
cd snort-2.9.18
./configure --enable-sourcefire && make && sudo make install
Downloads
yum install https://snort.org/downloads/snort/
                      
yum install https://snort.org/downloads/snort/snort-2.9.18-1.f33.x86_64.rpm
yum install https://snort.org/downloads/snort/
                      
yum install https://snort.org/downloads/snort/snort-2.9.18-1.centos8.x86_64.rpm
pkg install snort
execute: Snort_2_9_18_Installer.x64.exe
Step 2
Sign up/Subscribe

Sign up and get your Oinkcode. We recommend that everyone subscribe to get the latest detections. For those unable to subscribe, creating an account on Snort.org will still give you access to the registered user rule packages.

Step 3

Stay current with the latest updates using PulledPork

wget https://snort.org/downloads/community/community-rules.tar.gz -O community-rules.tar.gz
tar -xvzf community-rules.tar.gz -C /etc/snort/rules
Download the rule package that corresponds to your Snort version, for more information on how to retreive your oinkcode.
wget https://snort.org/rules/snortrules-snapshot-3150.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3150.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3140.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3140.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3130.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3130.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3110.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3110.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3101.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3101.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3100.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3100.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3034.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3034.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3031.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3031.tar.gz
wget https://snort.org/rules/snortrules-snapshot-2983.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2983.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3000.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3000.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29111.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29111.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29130.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29130.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29141.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29141.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29150.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29150.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29151.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29151.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29160.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29160.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29161.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29161.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29170.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29170.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29171.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29171.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29180.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29180.tar.gz
tar -xvzf snortrules-snapshot-<version>.tar.gz -C /etc/snort/rules
Downloads
Talos_LightSPD.tar.gz
snortrules-snapshot-3150.tar.gz
snortrules-snapshot-3140.tar.gz
snortrules-snapshot-3130.tar.gz
snortrules-snapshot-3110.tar.gz
snortrules-snapshot-3101.tar.gz
snortrules-snapshot-3100.tar.gz
snortrules-snapshot-3034.tar.gz
snortrules-snapshot-3031.tar.gz
snortrules-snapshot-2983.tar.gz
snortrules-snapshot-3000.tar.gz
snortrules-snapshot-29111.tar.gz
snortrules-snapshot-29130.tar.gz
snortrules-snapshot-29141.tar.gz
snortrules-snapshot-29150.tar.gz
snortrules-snapshot-29151.tar.gz
snortrules-snapshot-29160.tar.gz
snortrules-snapshot-29161.tar.gz
snortrules-snapshot-29170.tar.gz
snortrules-snapshot-29171.tar.gz
snortrules-snapshot-29180.tar.gz
Download the rule package that corresponds to your Snort version, for more information on how to retreive your oinkcode.
wget https://snort.org/rules/snortrules-snapshot-3150.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3150.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3140.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3140.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3130.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3130.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3110.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3110.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3101.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3101.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3100.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3100.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3034.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3034.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3031.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3031.tar.gz
wget https://snort.org/rules/snortrules-snapshot-2983.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-2983.tar.gz
wget https://snort.org/rules/snortrules-snapshot-3000.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-3000.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29111.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29111.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29130.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29130.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29141.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29141.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29150.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29150.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29151.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29151.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29160.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29160.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29161.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29161.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29170.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29170.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29171.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29171.tar.gz
wget https://snort.org/rules/snortrules-snapshot-29180.tar.gz?oinkcode=<oinkcode> -O snortrules-snapshot-29180.tar.gz
tar -xvzf snortrules-snapshot-<version>.tar.gz -C /etc/snort/rules
Downloads
Talos_LightSPD.tar.gz
snortrules-snapshot-3150.tar.gz
snortrules-snapshot-3140.tar.gz
snortrules-snapshot-3130.tar.gz
snortrules-snapshot-3110.tar.gz
snortrules-snapshot-3101.tar.gz
snortrules-snapshot-3100.tar.gz
snortrules-snapshot-3034.tar.gz
snortrules-snapshot-3031.tar.gz
snortrules-snapshot-2983.tar.gz
snortrules-snapshot-3000.tar.gz
snortrules-snapshot-29111.tar.gz
snortrules-snapshot-29130.tar.gz
snortrules-snapshot-29141.tar.gz
snortrules-snapshot-29150.tar.gz
snortrules-snapshot-29151.tar.gz
snortrules-snapshot-29160.tar.gz
snortrules-snapshot-29161.tar.gz
snortrules-snapshot-29170.tar.gz
snortrules-snapshot-29171.tar.gz
snortrules-snapshot-29180.tar.gz
Step 4
Read Docs

For more details please reference our install guides on the documents page.

What is Snort?
It is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.
What is Snort?
It is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on the name below.
Snort 3 Setup Guides
Official Documentation
Snort Team / Open Source Community
Additional Resources
Submit a False Positive
Please sign in and click the false positives tab in your account dashboard
Rule Docs
1-57797
This rule detects a useless bitshift which was observed in obfuscated malicious Javascript samples.
1-57791
This rule detects the attempted download of Win.Packed.SmokeLoader variants, also known as Conti ransomware by looking for unique data contained within the executable file.
1-57790
This rule detects the attempted download of Win.Malware.Agent malicious executable by looking for specific data used in the executable.
With over 5 million downloads and over 600,000 registered users, it is the most widely deployed intrusion prevention system in the world.
With over 5 million downloads and over 600,000 registered users, it is the most widely deployed intrusion prevention system in the world.