IP Address: 206.168.34.212


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
22 days ago
[probe-44-49] 2026-03-21 15:49:11, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
24 days ago
[probe-44-49] 2026-03-20 06:53:09, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
24 days ago
[rede-188] 2026-03-20 03:50:26, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
25 days ago
ipban 4.0.0 - 14
BruteForce
RDP
EugeneK
28 days ago
ipban 3.0.0 - 14
BruteForce
RDP
28 days ago
[arem1] 2026-03-15 07:52:53, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /wak2hsfujdq6pu_vw1
PortScan
HTTP
29 days ago
[rede-188] 2026-03-14 07:56:08, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-13 06:50:37, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-12 22:50:30, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-09 06:40:36, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 2.0.1 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-03-04 08:52:20, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /1z8rpal77a
PortScan
HTTP
Anonymous
one month ago
fail2ban
Hacking
HTTP
one month ago
[probe-44-49] 2026-02-23 01:55:21, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
one month ago
ipban 3.0.0 - 4653
BruteForce
RDP
one month ago
[probe-168-134] 2026-02-20 17:19:52, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-17 22:01:33, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-15 01:04:26, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
fail2ban
Hacking
HTTP
2 months ago
[probe-44-49] 2026-02-11 18:16:11, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-168-134] 2026-02-09 14:05:57, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /0wz70kg6ac
PortScan
HTTP
2 months ago
[probe-68-69] 2026-02-09 13:04:17, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /b02_9gx9oyuxouf
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-08 14:29:33, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-06 09:03:14, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-04 22:02:55, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /9h_zgcit66bozp
PortScan
HTTP
2 months ago
[probe-168-134] 2026-02-03 07:44:32, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-02 15:57:36, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /hopbc1w___z3f_n2kl
PortScan
HTTP
2 months ago
[probe-68-69] 2026-02-02 14:48:36, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /suewu0r86ytaiuh
PortScan
HTTP
2 months ago
[probe-168-134] 2026-01-31 00:02:13, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipban 1.8.0
BruteForce
RDP
2 months ago
Connection to port 23 from port 6788
BruteForce
Telnet
2 months ago
[probe-44-49] 2026-01-17 03:48:02, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[arem1] 2026-01-16 10:11:49, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
3 months ago
ipban 1.8.1 - 14
BruteForce
RDP
3 months ago
[arem1] 2026-01-09 04:01:32, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
3 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
fail2ban
BruteForce
postfix
3 months ago
ipban 1.8.0
BruteForce
RDP
3 months ago
[probe-68-69] 2025-12-22 10:56:45, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 3.0.0
BruteForce
Nginx
ric404
3 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
Anonymous
3 months ago
ipban 1.8.1 - 14
BruteForce
RDP
4 months ago
[probe-168-134] 2025-12-08 13:03:29, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[rede-188] 2025-12-07 01:01:23, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
fail2ban
BruteForce
dovecot
ric404
4 months ago
ipban 3.0.0 - 14
BruteForce
RDP
4 months ago
[probe-168-134] 2025-11-19 18:58:10, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[rede-188] 2025-11-12 19:08:01, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[arem1] 2025-11-09 01:13:55, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-68-69] 2025-11-08 19:53:31, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-168-134] 2025-11-08 05:06:24, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Nudlz
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.0 - 14
BruteForce
RDP
5 months ago
Connection to port 3389 from port 33042
BruteForce
RDP
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
imcas
5 months ago
ipban 1.9.0 - 400
BruteForce
Apache
Anonymous
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
ric404
6 months ago
ipban 3.0.0 - 14
BruteForce
RDP
6 months ago
[arem1] 2025-10-06 05:13:50, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
6 months ago
[probe-168-134] 2025-09-30 15:58:20, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-09-25 09:14:02, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
7 months ago
[probe-168-134] 2025-09-18 01:33:49, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-09-15 09:52:38, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-09-08 10:06:01, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-08-30 17:57:51, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-08-29 09:12:00, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-08-24 08:14:19, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
fail2ban
BruteForce
postfix
Anonymous
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-08-16 09:05:24, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 3.0.0 - Connection closed
BruteForce
SSH
8 months ago
[probe-44-49] 2025-08-06 09:16:00, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-08-04 14:54:46, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[arem1] 2025-07-21 00:55:55, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-07-18 06:59:29, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-176-124] 2025-07-14 12:42:35, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-07-11 03:01:38, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
Connection to port 11211 from port 40344
DDos
Memcached
9 months ago
[probe-44-49] 2025-07-03 02:46:19, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-06-30 08:13:42, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
ipban 1.8.0
BruteForce
RDP
9 months ago
[probe-44-49] 2025-06-26 14:57:15, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
[probe-44-49] 2025-06-14 01:56:20, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
[probe-44-49] 2025-06-01 03:28:31, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
10 months ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
11 months ago
ipban 2.0.0 - 14
BruteForce
RDP
11 months ago
[probe-194-217] 2025-05-18 21:52:07, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
11 months ago
ipban 1.8.0
BruteForce
RDP
11 months ago
[probe-44-49] 2025-05-10 07:48:10, Client: 206.168.34.212, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
11 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
Anonymous
one year ago
ipban 1.9.0 - 5152
BruteForce
RDP
one year ago
ipban 1.9.0 - 5152
BruteForce
RDP
Contact IPThreat