fail2ban bad ip database: ip 111.230.140.177

| ip database | live view | stats | report | help | api key:

ip: 111.230.140.177
hostname: 111.230.140.177
country: [CN] China
first reported: 01.10.2018 21:13.18 GMT+0200
last reported: 20.02.2019 00:41.51 GMT+0200
time period: 141d 04h 28m 33s
total reports: 11
reported by: 4 host(s)
filter(s): ssh (8)
ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '111.230.140.177':

[-hide]
# Nmap 6.40 scan initiated Mon Oct  1 21:14:02 2018 as: /usr/bin/nmap -sU -sS -O 111.230.140.177
Nmap scan report for 111.230.140.177
Host is up (0.31s latency).
Not shown: 1000 open|filtered ports, 998 filtered ports
PORT   STATE  SERVICE
22/tcp open   ssh
80/tcp closed http
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.40%E=4%D=10/1%OT=22%CT=80%CU=%PV=N%G=Y%TM=5BB2770B%P=x86_64-pc-
OS:linux-gnu)SEQ(TI=Z%TS=8)ECN(R=N)T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
OS:T1(R=N)T2(R=N)T3(R=N)T4(R=N)T5(R=N)T6(R=N)T7(R=N)U1(R=N)IE(R=Y%DFI=N%TG=
OS:40%CD=S)


OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Mon Oct  1 21:35:39 2018 -- 1 IP address (1 host up) scanned in 1297.21 seconds
Σ = 69 | Δt = 0.004425048828125s