IP Address: 206.168.34.207


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
Anonymous
19 days ago
fail2ban
Hacking
HTTP
21 days ago
[probe-44-49] 2026-03-17 08:01:52, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
24 days ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[rede-188] 2026-03-03 15:52:08, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[arem1] 2026-03-01 12:00:56, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /lutraryp_
PortScan
HTTP
one month ago
[arem1] 2026-02-28 08:13:04, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-25 14:45:56, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-23 22:02:52, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-20 01:05:30, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /og2xzi7_qrqp6
PortScan
HTTP
one month ago
[rede-188] 2026-02-19 01:01:03, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /rt1viwua1iknl_aj
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-07 11:29:32, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-68-69] 2026-02-06 00:55:38, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /4vsxn5w5yvoon
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-05 21:56:35, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipban 1.8.1 - 14
BruteForce
RDP
2 months ago
Connection to port 21 from port 40000
BruteForce
FTP
2 months ago
[probe-44-49] 2026-01-20 08:08:59, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-168-134] 2026-01-19 01:30:10, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-16 15:54:18, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
fail2ban
BruteForce
dovecot
3 months ago
ipban 1.9.0 - 14
BruteForce
RDP
Anonymous
3 months ago
ipban 4.0.0 - 14
BruteForce
RDP
Anonymous
3 months ago
fail2ban
BruteForce, Hacking, PortScan
postfix
ric404
4 months ago
ipban 3.0.0 - 14
BruteForce
RDP
4 months ago
Connection to port 5900 from port 19854
BruteForce
VNC
4 months ago
ipban 1.9.0 - 14
BruteForce
RDP
ric404
4 months ago
ipban 3.0.0 - 14
BruteForce
RDP
Anonymous
4 months ago
ipban 3.0.0 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.0 - 14
BruteForce
RDP
5 months ago
[rede-188] 2025-10-20 00:24:10, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-168-134] 2025-10-05 07:17:03, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-168-134] 2025-10-03 15:50:43, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[rede-188] 2025-09-30 06:21:52, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Kamil
6 months ago
fail2ban
BruteForce
postfix
6 months ago
[probe-168-134] 2025-09-22 18:21:50, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-09-21 08:56:42, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
Connection to port 3306 from port 41960
BruteForce
MySQL
Anonymous
7 months ago
ipban 1.8.0 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-09-02 06:01:31, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[arem1] 2025-08-29 07:14:26, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-08-24 16:02:08, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-08-22 15:49:13, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
7 months ago
ipban 3.0.0 - Connection closed
BruteForce
SSH
7 months ago
[probe-44-49] 2025-08-15 21:00:37, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-08-07 15:14:30, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-08-06 05:58:14, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[rede-188] 2025-07-26 17:03:34, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-68-69] 2025-07-26 06:32:24, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-68-69] 2025-07-19 03:03:31, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
9 months ago
Connection to port 3389 from port 37302
BruteForce
RDP
9 months ago
[probe-168-134] 2025-06-29 08:03:00, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-06-26 11:54:17, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-06-20 12:11:25, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
Connection to port 3389 from port 53964
BruteForce
RDP
10 months ago
[probe-68-69] 2025-06-12 17:55:53, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
[probe-44-49] 2025-06-11 02:19:12, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
fail2ban
BruteForce
dovecot
10 months ago
[probe-44-49] 2025-06-08 04:51:04, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
Connection to port 143 from port 50408
PortScan
Port 143
10 months ago
ipbanpro 4.2.0 - 14
BruteForce
RDP
Anonymous
11 months ago
ipban 3.0.0 - 14
BruteForce
RDP
11 months ago
[probe-44-49] 2025-05-10 22:20:12, Client: 206.168.34.207, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
11 months ago
fail2ban
BruteForce
dovecot
ric404
11 months ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.9.0 - 5152
BruteForce
RDP
ric404
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
EugeneK
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
ric404
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
EugeneK
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.0 - 14
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
Censys.io.Scanner
Hacking
IPS
one year ago
ipban 1.8.0
BruteForce
RDP
Nudlz
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
RLorenz
one year ago
ipbanpro 3.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 1.9.0
BruteForce
Apache
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
port/1234
Hacking
TCP
Anonymous
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
one year ago
port/443
Hacking
TCP
Anonymous
one year ago
port/221
Hacking
TCP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Contact IPThreat