IP Address: 206.168.34.93


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
5 months ago
[probe-44-49] 2025-09-09 07:20:22, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
5 months ago
ipban 1.9.0
BruteForce
Apache
5 months ago
ipban 2.0.1 - 14
BruteForce
RDP
5 months ago
[probe-44-49] 2025-09-01 05:02:56, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-08-29 12:29:17, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
6 months ago
[rede-188] 2025-08-25 20:55:43, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-21 08:01:15, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-17 09:10:18, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-08 18:01:07, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-07 06:17:12, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-02 08:02:22, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
ipban 1.8.0
BruteForce
RDP
Kamil
7 months ago
fail2ban
BruteForce
postfix
7 months ago
[probe-44-49] 2025-07-21 20:42:57, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-07-20 22:54:53, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-07-19 07:19:40, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-18 14:58:17, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-13 08:08:32, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-07-09 23:47:29, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-07-09 12:56:24, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
7 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
7 months ago
[probe-44-49] 2025-07-08 07:22:26, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-07 00:52:08, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-07-02 22:58:01, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-01 10:43:52, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-19 02:32:44, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-12 01:36:41, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-09 07:22:36, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-07 08:57:34, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
Anonymous
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-05-30 17:18:47, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
ipban 1.8.0
BruteForce
RDP
9 months ago
[probe-44-49] 2025-05-27 15:44:36, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-05-25 14:20:06, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-05-19 00:33:08, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-05-18 13:15:17, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
9 months ago
[probe-44-49] 2025-05-16 22:46:24, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
9 months ago
[rede-188] 2025-05-12 02:13:01, Client: 206.168.34.93, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
Connection to port 5900 from port 60632
BruteForce
VNC
Anonymous
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
fail2ban
BruteForce
dovecot
10 months ago
Connection to port 2222 from port 48946
PortScan
Port 2222
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
EugeneK
11 months ago
ipban 2.0.0 - 14
BruteForce
RDP
11 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
Nudlz
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.0 - 14
BruteForce
RDP
one year ago
Censys.io.Scanner
Hacking
IPS
one year ago
ipban 2.0.1 - 14
BruteForce
RDP
one year ago
Censys.io.Scanner
Hacking
IPS
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Deny
one year ago
fail2ban
BruteForce
nginx-bad-request
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Contact IPThreat