fail2ban bad ip database: ip 118.163.73.38

| ip database | live view | stats | report | help | api key:

ip: 118.163.73.38
hostname: 118-163-73-38.HINET-IP.hinet.net
country: [TW] Taiwan
first reported: 07.10.2017 23:40.38 GMT+0100
last reported: 05.02.2019 14:09.58 GMT+0100
time period: 485d 15h 29m 20s
total reports: 10
reported by: 4 host(s)
filter(s): sshd (8)
ssh (2)
tor exit node no
badips.com db
Lookup
  

port scan of '118.163.73.38':

[-hide]
# Nmap 6.40 scan initiated Sat Oct  7 23:41:02 2017 as: /usr/bin/nmap -sU -sS -O 118.163.73.38
Nmap scan report for 118-163-73-38.HINET-IP.hinet.net (118.163.73.38)
Host is up (0.22s latency).
Not shown: 998 filtered ports, 996 open|filtered ports
PORT     STATE  SERVICE
80/tcp   open   http
1723/tcp open   pptp
68/udp   closed dhcpc
137/udp  closed netbios-ns
138/udp  closed netbios-dgm
500/udp  open   isakmp
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 2.6.18 - 2.6.31 (96%), OpenWrt Kamikaze 8.09 (Linux 2.4.35.4) (95%), OpenWrt Kamikaze 8.09 (Linux 2.6.26) (95%), Thecus 4200 or N5500 NAS device (Linux 2.6.33) (95%), Linux 3.0.0 (94%), OpenWrt Kamikaze 8.09 (Linux 2.4.35) (94%), Linux 2.6.26 (94%), OpenWrt (Linux 2.4.30 - 2.4.34) (94%), Linux 2.6.32 (93%), OpenWrt (Linux 2.4.32) (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sat Oct  7 23:41:54 2017 -- 1 IP address (1 host up) scanned in 52.39 seconds
Σ = 42 | Δt = 0.0036020278930664s