fail2ban bad ip database: ip

| ip database | live view | stats | report | help | api key:

country: [CN] China
first reported: 11.12.2017 22:14.45 GMT+0200
last reported: 06.03.2019 11:29.39 GMT+0200
time period: 449d 13h 14m 54s
total reports: 13
reported by: 3 host(s)
filter(s): ssh (12)
ssh (1)
tor exit node no db

port scan of '':

# Nmap 6.40 scan initiated Mon Dec 11 22:15:03 2017 as: /usr/bin/nmap -sU -sS -O
Nmap scan report for
Host is up (0.25s latency).
Not shown: 1987 closed ports
80/tcp   filtered      http
445/tcp  filtered      microsoft-ds
4444/tcp filtered      krb524
135/udp  open|filtered msrpc
136/udp  open|filtered profile
137/udp  open|filtered netbios-ns
138/udp  open|filtered netbios-dgm
139/udp  open|filtered netbios-ssn
445/udp  open|filtered microsoft-ds
631/udp  open|filtered ipp
1433/udp open|filtered ms-sql-s
1434/udp open|filtered ms-sql-m
5353/udp open          zeroconf
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: broadband router|storage-misc|WAP|general purpose
Running: Linksys embedded, Linux 2.4.X|2.6.X
OS CPE: cpe:/h:linksys:wrv200 cpe:/h:linksys:nas200 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22
OS details: Linksys WRV200 wireless broadband router, Linksys NAS200 NAS device, DD-WRT v24-sp2 (Linux 2.4.36), Linux 2.6.22 (Kubuntu, x86), Linux 2.6.25 (openSUSE 11.0)
Network Distance: 13 hops

OS detection performed. Please report any incorrect results at .
# Nmap done at Mon Dec 11 22:44:15 2017 -- 1 IP address (1 host up) scanned in 1754.13 seconds
Σ = 105 | Δt = 0.005382776260376s