Hello,
Maybe we should open a new thread as this seems to be a bit different than your initial question.
Anyway, here you have some thoughts.
the rule i matching in your suricata should be this one with SID 2010937
alert tcp $EXTERNAL_NET any -> $HOME_NET 3306 (msg:"ET SCAN
Suspicious inbound to mySQL port 3306"; flow:to_server; flags:S;
threshold: type limit, count 5, seconds 60, track by_src;
reference:url,
doc.emergingthreats.net/2010937; classtype:bad-unknown;
sid:2010937; rev:3; metadata:created_at 2010_07_30, former_category
HUNTING, updated_at 2018_03_27;)
You will have some options:
1.- verify your suricata.yaml configuration and review EXTERNAL_NET and HOME_NET definitions. this alert should only be fired when traffic is from external to internal. where are you listening the traffic?
2.- disable the rule if you don't want this to be triggered any more, edit emerging-scan.rules file and modify to something like this
define it as a pass rule
pass tcp $EXTERNAL_NET any -> $HOME_NET 3306 (msg:"ET SCAN
Suspicious inbound to mySQL port 3306"; flow:to_server; flags:S;
threshold: type limit, count 5, seconds 60, track by_src;
reference:url,
doc.emergingthreats.net/2010937; classtype:bad-unknown;
sid:2010937; rev:3; metadata:created_at 2010_07_30, former_category
HUNTING, updated_at 2018_03_27;)
or
disable the rule
#alert tcp $EXTERNAL_NET any -> $HOME_NET 3306 (msg:"ET SCAN
Suspicious inbound to mySQL port 3306"; flow:to_server; flags:S;
threshold: type limit, count 5, seconds 60, track by_src;
reference:url,
doc.emergingthreats.net/2010937; classtype:bad-unknown;
sid:2010937; rev:3; metadata:created_at 2010_07_30, former_category
HUNTING, updated_at 2018_03_27;)
you can also clone the rule and set a better source and destination params.
Restart or reload your suricata after change is done.
3.- as Victor did explain in previous answers you can create a rule that will check sid field and set that rule to level=0.
Let us know which one should be best approach to you. My suggestion is work in suricata side options 1 and 2.
Thanks