fail2ban bad ip database: ip 103.23.102.3

| ip database | live view | stats | report | help | api key:

ip: 103.23.102.3
hostname: 3.subnet-103.23.102.host.unnes.ac.id
country: [ID] Indonesia
first reported: 17.11.2018 11:43.43 GMT+0100
last reported: 30.11.2018 22:57.52 GMT+0100
time period: 13d 11h 14m 09s
total reports: 11
reported by: 2 host(s)
filter(s): sshd (6)
ssh (5)
tor exit node no
badips.com db
Lookup
  

port scan of '103.23.102.3':

[-hide]
# Nmap 6.40 scan initiated Sat Nov 17 11:44:01 2018 as: /usr/bin/nmap -sU -sS -O 103.23.102.3
Nmap scan report for 3.subnet-103.23.102.host.unnes.ac.id (103.23.102.3)
Host is up (0.19s latency).
Not shown: 996 open|filtered ports, 990 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   open   http
81/tcp   closed hosts2-ns
443/tcp  closed https
902/tcp  closed iss-realsecure
1080/tcp closed socks
3389/tcp closed ms-wbt-server
5061/tcp closed sip-tls
5901/tcp closed vnc-1
8080/tcp closed http-proxy
53/udp   open   domain
1812/udp closed radius
1813/udp closed radacct
5001/udp closed commplex-link
Aggressive OS guesses: Linux 2.6.23 - 2.6.38 (96%), Linux 2.6.26 - 2.6.35 (94%), Linux 2.6.22 - 2.6.36 (93%), Linux 2.6.31 - 2.6.35 (93%), Linux 2.6.8 - 2.6.27 (93%), Linux 2.6.32 (93%), Linux 2.6.31 (92%), DD-WRT v24-sp1 (Linux 2.4.36) (91%), Linux 3.0 (91%), Linux 2.6.17 - 2.6.36 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: -194 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sat Nov 17 11:44:38 2018 -- 1 IP address (1 host up) scanned in 37.52 seconds
Σ = 7 | Δt = 0.0037620067596436s