AbuseIPDB » 206.168.34.49

206.168.34.49 was found in our database!

This IP was reported 5,522 times. Confidence of Abuse is 100%: ?

100%
ISP Censys, Inc.
Usage Type Commercial
ASN AS398324
Hostname(s) unused-space.coop.net
Domain Name censys.com
Country United States of America
City Chicago, Illinois

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 206.168.34.49:

This IP address has been reported a total of 5,522 times from 674 distinct sources. 206.168.34.49 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
ThreatBook.io
ThreatBook Intelligence: Zombie,Scanner more details on https://threatbook.io/ip/206.168.34.49
SSH
Anonymous
Port Scan Brute-Force SSH
slartybartfast69420blazit
Fail2ban picked up 206.168.34.49 attacking nginx
Web App Attack
Abu Bakr
endlessh-go tarpit accepted connection
Brute-Force SSH
rtbh.com.tr
list.rtbh.com.tr report: tcp/9999
Brute-Force
forgeban
Honeypot hit: Empty payload (likely service probe); 34315 [1] TCP
Port Scan
VMHeaven.io
Blocked by UFW [18246/tcp]
Source port: 47970
TTL: 47
Packet length: 60
Port Scan
dzpk
Web App Attack
MPL
tcp/26 (5 or more attempts)
Port Scan
www.winos.me
Default ban by fail2ban
Brute-Force Web App Attack SSH
sefinek.net
Honeypot hit: Empty payload (likely service probe); 15444 [3] TCP
Port Scan
Flock4325
Attempted direct HTTP(s) request to server IP. URI: /
Brute-Force
Anonymous
206.168.34.49 - - [19/Jul/2025:01:14:05 +0000] "\x16\x03\x01" 400 392 "-" "-"
...
Bad Web Bot Web App Attack
public csirt
Honeypot hit: HTTP header with cookie; 1098 [2] TCP
Hacking Web App Attack
ThreatBook.io
SSH

Showing 1 to 15 of 5522 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: