in case anyone wants Suricata detection rules against different types of NMAP scans and scan speeds (T1-T5), I wrote a bundle into Github, which do just that. Tested in a SoHo / home environment with OPNsense:
Everyday scanning into our WAN interfaces does generate some extra log entries, somedays a lot, but at least I personally like to see who is trying to love my router without consent.
Be safe, everyone, and if you happen to like these rules, please consider to star the repository to make it worth the time. Thanks a lot.
Thanks a lot for taking the time to comment, and also very happy to hear that they are helping you. Me too, I wouldn’t have a router without them anymore.