fail2ban bad ip database: ip 116.247.77.92

| ip database | live view | stats | report | help | api key:

ip: 116.247.77.92
hostname: 116.247.77.92
country: [CN] China
first reported: 02.08.2018 19:35.48 GMT+0100
last reported: 22.01.2019 07:48.34 GMT+0100
time period: 172d 13h 12m 46s
total reports: 10
reported by: 3 host(s)
filter(s): sshd (9)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '116.247.77.92':

[-hide]
# Nmap 6.40 scan initiated Thu Aug  2 19:36:02 2018 as: /usr/bin/nmap -sU -sS -O 116.247.77.92
Nmap scan report for 116.247.77.92
Host is up (0.20s latency).
Not shown: 1969 closed ports
PORT     STATE         SERVICE
21/tcp   open          ftp
22/tcp   open          ssh
42/tcp   filtered      nameserver
80/tcp   open          http
135/tcp  filtered      msrpc
139/tcp  filtered      netbios-ssn
445/tcp  filtered      microsoft-ds
593/tcp  filtered      http-rpc-epmap
1025/tcp filtered      NFS-or-IIS
1068/tcp filtered      instl_bootc
1434/tcp filtered      ms-sql-m
3128/tcp filtered      squid-http
3306/tcp open          mysql
3389/tcp open          ms-wbt-server
4444/tcp filtered      krb524
8009/tcp open          ajp13
8080/tcp open          http-proxy
9009/tcp open          pichat
9090/tcp open          zeus-admin
67/udp   open|filtered dhcps
68/udp   open|filtered dhcpc
123/udp  open          ntp
137/udp  open          netbios-ns
138/udp  open|filtered netbios-dgm
631/udp  open|filtered ipp
1026/udp filtered      win-rpc
1027/udp filtered      unknown
1068/udp open|filtered instl_bootc
1434/udp open|filtered ms-sql-m
1701/udp open|filtered L2TP
5353/udp open|filtered zeroconf
Device type: webcam|firewall|general purpose|terminal|WAP
Running (JUST GUESSING): Tandberg embedded (87%), IPFire Linux 2.6.X (87%), Linux 3.X|2.6.X|2.4.X (87%), IGEL Linux 2.6.X (85%)
OS CPE: cpe:/h:tandberg:vcs cpe:/o:ipfire:linux:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:igel:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4
Aggressive OS guesses: Tandberg VCS video conferencing system (87%), IPFire firewall 2.11 (Linux 2.6.32) (87%), Linux 3.2 - 3.6 (87%), Linux 2.6.32 (86%), IGEL UD3 thin client (Linux 2.6) (85%), Linux 2.6.35 (85%), DD-WRT v24-sp1 (Linux 2.4) (85%), Linux 2.6.32 - 2.6.39 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 19 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Thu Aug  2 20:00:59 2018 -- 1 IP address (1 host up) scanned in 1498.69 seconds
Σ = 42 | Δt = 0.0033130645751953s