Same as others, intrusion of Intrusion.Win.MSSQL.worm.Helkern from this IP. (Blocked by my Firewall)
UDP from 200.91.37.44 to local port 1434Intrusion.Win.MSSQL.worm.Helkern 12/16/2012 5:02:23 PM Several of these over a 3 week period
UDP from 200.91.37.44 to local port 1434Intrusion.Win.MSSQL.worm.Helkern 05/11/2013 21:08:10
Kaspersky reports: "Intrusion.Win.MSSQL.worm.Helkern" Simultaneously I am recieving fake phone calls to my voip softphone.
200.91.37.44 tried to damage my system and penetrated illegally into my privacy
Microsoft SQL Server Stack Overflow Vulnerability ID: 30009 Description: Microsoft SQL Server is prone to a remote stack overflow vulnerability. A SQL request packet with the first byte set to 0x04,and followed by a long string would overflow the stack, as the server attempts to open a registry key with the data. A successful attack may result in arbitrary code execution with SYSTEM privileges leading to a full compromise.
please block this ip adress 200.91.37.44 it is trying to hack my pc since march. every time it attacks there is a kaspersky report Intrusion. win.MSSQL.worm.Helkern object:200.91.37.44 status: Undefined
Attack on my pc as well. Intrusion,tried to install Win.MSSQL.worm.H; With so many complaints about this address; Why is it still doing it?
Attack from this ip on my laptop,kaspersky internet security blocked it. Trying to inject win.mssql.worm.kelkern.
Intrusion of Intrusion.Win.MSSQL.worm.Helkern from this IP. (Blocked by my Firewall)
Blocked by McAfee HIP IPS, signature 3720 "MSSQL Resolution Service Buffer Overflow (Slammer)"
Intrusion.Win.MSSQL.worm.Helkern from this IP Blocked by "Kaspersky Internet Security 2014"
Только козлы могут вторгаться в чужие огороды
Intrusion.Win.MSSQL.worm.Helkern from this IP Blocked by Kaspersky Internet Security 2013. Occurences almost daily from this and other ISP's. (Addresses reported as spoofed.)
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 200.91.37.44 IP address
- Hacked Gmail accounts
- WordPress Hacking Attempts
- SSH Hacking Attempts
- Why Can't I See The Exact Address?
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.