IP Address: 206.168.34.58


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
2 days ago
[probe-44-49] 2026-02-15 19:06:11, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /6v_d1d70d
PortScan
HTTP
8 days ago
ipban 3.1.0 - 14
BruteForce
RDP
9 days ago
[probe-44-49] 2026-02-08 12:09:33, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
14 days ago
[probe-44-49] 2026-02-03 09:06:22, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
22 days ago
Connection to port 9200 from port 56616
BruteForce
Elasticsearch
23 days ago
[probe-44-49] 2026-01-25 13:07:49, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /_ere1buhz6fm
PortScan
HTTP
EugeneK
23 days ago
ipban 3.1.0 - 14
BruteForce
RDP
25 days ago
[probe-44-49] 2026-01-23 11:59:57, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /1u39z87eo37
PortScan
HTTP
29 days ago
[probe-44-49] 2026-01-20 00:11:03, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
Anonymous
one month ago
ipban 1.8.1 - 14
BruteForce
RDP
y0uCeF
one month ago
ipban 1.8.0
BruteForce
SSH
one month ago
[rede-188] 2026-01-06 09:28:03, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
one month ago
ipban 1.9.0 - 400
BruteForce
Apache
ric404
one month ago
ipban 3.0.0 - 14
BruteForce
RDP
one month ago
[arem1] 2025-12-28 10:54:29, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2025-12-26 15:56:24, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 2.0.1 - 14
BruteForce
RDP
Anonymous
2 months ago
ipban 2.0.1
BruteForce
RDP
2 months ago
fail2ban
BruteForce
dovecot
ric404
2 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
2 months ago
[arem1] 2025-12-08 01:13:52, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2025-12-01 14:09:49, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
[probe-168-134] 2025-11-20 02:05:35, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2025-11-04 17:19:13, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[rede-188] 2025-10-25 23:17:44, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
Connection to port 5900 from port 34356
BruteForce
VNC
4 months ago
[probe-168-134] 2025-09-30 15:35:30, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-44-49] 2025-09-27 11:28:50, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-15 09:50:42, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
5 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.0 - 14
BruteForce
RDP
5 months ago
ipban 1.8.0
BruteForce
RDP
5 months ago
[probe-168-134] 2025-09-04 20:26:56, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[rede-188] 2025-08-28 14:07:56, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
6 months ago
[probe-68-69] 2025-08-21 12:03:22, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-15 04:00:53, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
6 months ago
[probe-168-134] 2025-08-03 22:23:34, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
fail2ban
BruteForce
dovecot
7 months ago
[probe-44-49] 2025-07-25 08:44:39, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[arem1] 2025-07-24 10:04:16, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-20 09:12:47, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
ipban 1.8.0
BruteForce
RDP
8 months ago
Censys.io.Scanner
Hacking
IPS
8 months ago
[probe-44-49] 2025-06-23 17:01:46, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
Connection to port 143 from port 40574
PortScan
Port 143
8 months ago
Connection to port 3389 from port 57092
BruteForce
RDP
8 months ago
[probe-44-49] 2025-06-09 01:40:59, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[rede-188] 2025-06-07 17:53:59, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-06 13:13:21, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-68-69] 2025-06-02 09:00:34, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[sm-vultr-01] 2025-05-27 07:27:04, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
ipban 1.8.0
BruteForce
RDP
9 months ago
[probe-194-217] 2025-05-20 02:19:57, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-05-15 01:32:56, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-68-69] 2025-05-13 23:49:04, Client: 206.168.34.58, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
9 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
9 months ago
Connection to port 23 from port 33496
BruteForce
Telnet
Anonymous
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
11 months ago
fail2ban
BruteForce
dovecot
EugeneK
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 2.0.1 - 14
BruteForce
RDP
one year ago
ipban 2.0.1 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
Kamil
one year ago
fail2ban
BruteForce
postfix
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 1.9.0
BruteForce
Apache
imcas
one year ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
one year ago
Censys.io.Scanner
Hacking
IPS
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
ric404
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
port/17924
Hacking
TCP
Anonymous
one year ago
port/30022
Hacking
TCP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Anonymous
one year ago
port/65311
Hacking
TCP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Nudlz
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.9.0 - 5152
BruteForce
RDP
Contact IPThreat