fail2ban bad ip database: ip 119.90.39.158

| ip database | live view | stats | report | help | api key:

ip: 119.90.39.158
hostname: 119.90.39.158
country: [CN] China
first reported: 20.07.2018 04:09.50 GMT+0100
last reported: 28.11.2018 14:19.26 GMT+0100
time period: 131d 11h 09m 36s
total reports: 12
reported by: 3 host(s)
filter(s): sshd (11)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '119.90.39.158':

[-hide]
# Nmap 6.40 scan initiated Fri Jul 20 04:10:03 2018 as: /usr/bin/nmap -sU -sS -O 119.90.39.158
Warning: 119.90.39.158 giving up on port because retransmission cap hit (10).
Warning: 119.90.39.158 giving up on port because retransmission cap hit (10).
Nmap scan report for 119.90.39.158
Host is up (0.34s latency).
Not shown: 1986 closed ports
PORT      STATE         SERVICE
21/tcp    open          ftp
22/tcp    open          ssh
23/tcp    open          telnet
111/tcp   open          rpcbind
445/tcp   filtered      microsoft-ds
5800/tcp  filtered      vnc-http
5900/tcp  filtered      vnc
8090/tcp  open          unknown
10616/tcp open          unknown
111/udp   open          rpcbind
631/udp   open|filtered ipp
1026/udp  open|filtered win-rpc
1027/udp  open|filtered unknown
1434/udp  filtered      ms-sql-m
Aggressive OS guesses: Linux 3.2 (99%), Linux 3.1 (98%), AXIS 210A or 211 Network Camera (Linux 2.6) (98%), Linux 2.6.32 - 3.9 (96%), Linux 2.4.26 (Slackware 10.0.0) (95%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (94%), AXIS 211A Network Camera (Linux 2.6.20) (94%), Linux 2.6.24 (94%), Linux 2.6.16 (94%), Linux 2.6.32 (94%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Fri Jul 20 05:22:04 2018 -- 1 IP address (1 host up) scanned in 4322.01 seconds
Σ = 37 | Δt = 0.0036931037902832s