01:55:56.736 Alert Intrusion Prevention IPS Prevention Alert: VIRUS SQL Slammer Activity, SID: 1870, Priority: Medium 61.235.46.146, 4287, X1 172.16.2.10, 1434, X3
Have the chinese mother f***** have nothing else good to do? My computer is constantly being attacked from this IP from Beijing. Thanks to my antivirus for protection.
Where the EFF is the US Gov't on this? WHY isn't this address Blocked? Is Washington Guilty of aiding and abetting these filthy little commie fruitbags?
you ******* ****, piece of ****- do something usefull **** faced, duck ******* wanker!!! I'll get you you ****
The slant eyed gooks been attacking our computer over 100 times, along with a list of others 21 others and thats just the ones that i've written down...Note: you motherf****rs are going to pay for your crimes one way or another...BURN IN ****
worm helkern attack blocked by kaspersky..i've been tracing attackers i.p.s for the last 10 hours and reporting them and i believe i figured it out..i used to get on the earthcam and baladacam networks and started having all kinds of problems. Got off from them 4 months ago and got Kaspersky and the scanner has blocked over 200 attacks since then. I dont know how many of you are or have been on those networks, but i know for a fact my attacks have come from those 2 networks. To all attackers everywhere; YOUR F***ing days are numbered. You have been figured out. Attackers in china, japan, taiwan, ukraine,korea,ghana,california,massachusette, florida and even russia attackers...your all on those 2 networks....and your fix'n to go down in flames...people, SERIOUSLY, LISTEN to what i'm saying...if your on dsl or dial up, if you can, pay a few bucks more for a secure connection. I'm going back to cable myself..never had this problem until i got on dial up and then dsl.I'm telling at@t to shove their service up their ***. THANK YOU KASPERSKY, YOU SAVED OUR $1,500.00 computer well over 200 times in the last 4 months: Attackers/Hackers, get ready to be someone's Bit**. If reporting this doesnt stop you, i will find people who will...sorry for the book..HEL* NO I'M NOT!!!!!!
1/13/2012 4:51:27 AM Intrusion.Win.MSSQL.worm.Helkern 61.235.46.146 UDP 1434 how many times from you alone now, 30, 40, 50, times? thanks for spending so much time on me... you love me, you really love me...lololololol...guess it doesnt do any good to comment on here....hang in there hackers...each day that goes by, your one day closer to getting caught..GOD BLESS YOU and HAVE A NICE DAY!!!
1/15/2012 11:58:57 AM Intrusion.Win.MSSQL.worm.Helkern! Attacker's IP address: 61.235.46.146. Protocol/service: UDP on local port 1434. Time: 1/15/2012 11:58:57 AM thank you...try again
Network attack identified by Kaspersky antivirus. Blocked. Get a life, wankers.
UDP od 61.235.46.146 na port lokalny 1434 Zabroniono: Intrusion.Win.MSSQL.worm.Helkern 2012-01-17 21:51:43. Blocked!
Continues to try and inject an MSSQL Worm Slammer-1 into my network. My firewall blocked thankfully. This ip should be blocked.
If you feel like contacting these mush-wits, one way is to email this address: info@chinatietong.com Apparently, the our fine gov't doesn't mind their constant attempts to attack citizens, because this has been going on for a very long time.
PHYSICAL ADDRESSES AND PHONE NUMBERS FOR IP ADDRESS: 61.235.46.146 China Railway Telecommunications Center: Head Office 21/F, Yuetan Mansion, No. 2, Yuetan North Street, Xicheng District, Beijing 100045 TELELPHONE: 010-51890088 FAX:010-51847576 China Railway Telecommunications Center was bought by China Tietong, whose local Beijing contact info is: China Tietong Beijing Branch No.15,Beifengwo Road, Haidian District, Beijing 100038 TELEPHONE: 010-51822276 FAX: 010-51822556 Shall we fax them taped black pages to drink their ink?
Network attack again by Chinese Mother fuckers......IP Address: 61.235.46.146
17/02/2012 Unknown Denied: Intrusion.Win.MSSQL.worm.Helkern UDP from 61.235.46.146 to local port 1434 So it's been going on since October and even China Railway can only threaten faxing black pages! Are we wasting our time complaining?
I received a worm attack from 61.235.46.146 -> local:1434 Win2k/SQLSlammer.A
3/04/2012 11:58:57 AM Intrusion.Win.MSSQL.worm.Helkern! Attacker's IP address: 61.235.46.146. Protocol/service: UDP on local port 1434. Time:3/04/2012 12:15:37 AM be carefully Report
this ip had tried to hack my pc. it sent Intrusion.Win.MSSQL.worm.Helkern at 4/3/2012 8:24:47 PM Protocol:UDP from 61.235.46.146 to local port 1434 this ip should be banned.
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 61.235.46.146 IP address
- Hacked Gmail accounts
- WordPress Hacking Attempts
- SSH Hacking Attempts
- Why Can't I See The Exact Address?
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.