fail2ban bad ip database: ip 103.112.213.50

| ip database | live view | stats | report | help | api key:

ip: 103.112.213.50
hostname: host103-112-213-50.supersonicbroadband.com
country: [??] UNKNOWN
first reported: 19.09.2018 14:41.51 GMT+0100
last reported: 09.03.2019 21:45.08 GMT+0100
time period: 171d 08h 03m 17s
total reports: 8
reported by: 3 host(s)
filter(s): sshd (5)
ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '103.112.213.50':

[-hide]
# Nmap 6.40 scan initiated Wed Sep 19 14:42:02 2018 as: /usr/bin/nmap -sU -sS -O 103.112.213.50
Nmap scan report for host103-112-213-50.supersonicbroadband.com (103.112.213.50)
Host is up (0.16s latency).
Not shown: 999 open|filtered ports, 996 filtered ports
PORT     STATE SERVICE
22/tcp   open  ssh
80/tcp   open  http
443/tcp  open  https
8443/tcp open  https-alt
500/udp  open  isakmp
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (95%), OpenWrt White Russian 0.9 (Linux 2.4.30) (93%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (93%), Linux 2.4.18 (92%), Linux 2.6.18 - 2.6.24 (89%), Linux 2.6.9 - 2.6.21 (89%), Linux 2.6.18 - 2.6.32 (87%), OpenWrt (Linux 2.4.30 - 2.4.34) (87%), OpenWrt (Linux 2.4.32) (87%), Crestron XPanel control system (87%)
No exact OS matches for host (test conditions non-ideal).

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Sep 19 14:44:11 2018 -- 1 IP address (1 host up) scanned in 130.10 seconds
Σ = 39 | Δt = 0.0037109851837158s