fail2ban bad ip database: ip 103.40.235.188

| ip database | live view | stats | report | help | api key:

ip: 103.40.235.188
hostname: 103.40.235.188
country: [??] UNKNOWN
first reported: 02.09.2018 03:33.53 GMT+0100
last reported: 04.12.2018 20:52.53 GMT+0100
time period: 93d 18h 19m
total reports: 11
reported by: 2 host(s)
filter(s): sshd (6)
ssh (5)
tor exit node no
badips.com db
Lookup
  

port scan of '103.40.235.188':

[-hide]
# Nmap 6.40 scan initiated Sun Sep  2 03:34:02 2018 as: /usr/bin/nmap -sU -sS -O 103.40.235.188
Nmap scan report for 103.40.235.188
Host is up (0.38s latency).
Not shown: 994 open|filtered ports, 990 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   closed http
443/tcp  closed https
873/tcp  closed rsync
3306/tcp closed mysql
3333/tcp closed dec-notes
3389/tcp closed ms-wbt-server
3690/tcp closed svn
5555/tcp closed freeciv
8009/tcp closed ajp13
8080/tcp closed http-proxy
8090/tcp closed unknown
8443/tcp closed https-alt
9000/tcp closed cslistener
9200/tcp closed wap-wsp
500/udp  open   isakmp
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (93%), Linux 2.6.32 - 3.6 (93%), Linux 2.6.32 (93%), Linux 2.6.32 - 3.9 (93%), Linux 3.8 (91%), Crestron XPanel control system (89%), Linux 2.6.32 - 2.6.35 (89%), Linux 2.6.32 - 3.2 (89%), Linux 2.6.38 - 3.5 (89%), Linux 3.1 (89%)
No exact OS matches for host (test conditions non-ideal).

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sun Sep  2 03:39:20 2018 -- 1 IP address (1 host up) scanned in 318.57 seconds
Σ = 30 | Δt = 0.0045719146728516s