fail2ban bad ip database: ip 103.236.201.173

| ip database | live view | stats | report | help | api key:

ip: 103.236.201.173
hostname: server.makmuraya.com
country: [??] UNKNOWN
first reported: 16.11.2018 03:34.25 GMT+0100
last reported: 29.11.2018 04:34.21 GMT+0100
time period: 13d 59m 56s
total reports: 8
reported by: 3 host(s)
filter(s): sshd (8)
tor exit node no
badips.com db
Lookup
  

port scan of '103.236.201.173':

[-hide]
# Nmap 6.40 scan initiated Fri Nov 16 03:35:02 2018 as: /usr/bin/nmap -sU -sS -O 103.236.201.173
Nmap scan report for server.makmuraya.com (103.236.201.173)
Host is up (0.17s latency).
Not shown: 997 open|filtered ports, 992 filtered ports
PORT      STATE  SERVICE
22/tcp    open   ssh
80/tcp    open   http
6502/tcp  closed netop-rc
50000/tcp closed ibm-db2
50001/tcp open   unknown
50002/tcp open   iiimsf
50003/tcp open   unknown
50006/tcp closed unknown
22/udp    closed ssh
80/udp    closed http
443/udp   closed https
Aggressive OS guesses: Linux 2.6.26 - 2.6.35 (95%), Linux 2.6.22 (94%), Linux 3.0 - 3.9 (94%), Linux 2.6.23 - 2.6.38 (93%), Linux 2.6.32 (92%), Netgear DG834G WAP or Western Digital WD TV media player (92%), Linux 2.6.32 - 3.9 (92%), HP P2000 G3 NAS device (91%), Linux 2.6.8 - 2.6.27 (91%), Linux 3.0 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Fri Nov 16 03:35:48 2018 -- 1 IP address (1 host up) scanned in 46.66 seconds
Σ = 9 | Δt = 0.0042569637298584s