fail2ban bad ip database: ip 118.140.31.22

| ip database | live view | stats | report | help | api key:

ip: 118.140.31.22
hostname: sr-22-31-140-118-on-nets.com
country: [HK] Hong Kong
first reported: 19.11.2018 05:21.08 GMT+0100
last reported: 03.12.2018 18:59.16 GMT+0100
time period: 14d 13h 38m 08s
total reports: 8
reported by: 4 host(s)
filter(s): sshd (7)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '118.140.31.22':

[-hide]
# Nmap 6.40 scan initiated Mon Nov 19 05:22:01 2018 as: /usr/bin/nmap -sU -sS -O 118.140.31.22
Nmap scan report for sr-22-31-140-118-on-nets.com (118.140.31.22)
Host is up (0.20s latency).
Not shown: 997 open|filtered ports, 977 closed ports
PORT     STATE    SERVICE
21/tcp   open     ftp
22/tcp   open     ssh
53/tcp   open     domain
80/tcp   open     http
135/tcp  open     msrpc
443/tcp  open     https
1022/tcp open     exp2
1026/tcp open     LSA-or-nterm
1027/tcp open     IIS
1030/tcp open     iad1
1031/tcp open     iad2
1033/tcp open     netinfo
1034/tcp filtered zincite-a
1035/tcp open     multidropper
1036/tcp open     nsstp
1037/tcp open     ams
1038/tcp filtered mtqp
1039/tcp filtered sbl
4001/tcp open     newoak
4002/tcp open     mlchat-proxy
4003/tcp open     pxc-splr-ft
8080/tcp open     http-proxy
8181/tcp open     unknown
123/udp  open     ntp
1038/udp filtered mtqp
1039/udp filtered sbl
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.40%E=4%D=11/19%OT=21%CT=1%CU=%PV=N%G=Y%TM=5BF23AAB%P=x86_64-pc-
OS:linux-gnu)SEQ(SP=FE%GCD=1%ISR=10A%TI=Z%CI=I%TS=7)SEQ(SP=FD%GCD=1%ISR=10A
OS:%TI=Z%TS=7)OPS(O1=M5B4ST11NW6%O2=M5B4ST11NW6%O3=M5B4NNT11NW6%O4=M5B4ST11
OS:NW6%O5=M5B4ST11NW6%O6=M5B4ST11)WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=38
OS:90%W6=3890)ECN(R=Y%DF=Y%TG=40%W=3908%O=M5B4NNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%TG
OS:=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=
OS:R%O=%RD=0%Q=)T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%
OS:TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=N)IE(R=Y%DFI=N%TG=40%CD=S)


OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Mon Nov 19 05:23:07 2018 -- 1 IP address (1 host up) scanned in 65.88 seconds
Σ = 8 | Δt = 0.0042588710784912s