fail2ban bad ip database: ip 123.127.107.70

| ip database | live view | stats | report | help | api key:

ip: 123.127.107.70
hostname: 123.127.107.70
country: [CN] China
first reported: 28.09.2017 12:48.02 GMT+0100
last reported: 30.11.2018 21:27.25 GMT+0100
time period: 428d 09h 39m 23s
total reports: 10
reported by: 3 host(s)
filter(s): sshd (8)
ssh (2)
tor exit node no
badips.com db
Lookup
  

port scan of '123.127.107.70':

[-hide]
# Nmap 6.40 scan initiated Thu Sep 28 12:49:03 2017 as: /usr/bin/nmap -sU -sS -O 123.127.107.70
Nmap scan report for 123.127.107.70
Host is up (0.19s latency).
Not shown: 1980 closed ports
PORT      STATE         SERVICE
22/tcp    open          ssh
80/tcp    open          http
111/tcp   open          rpcbind
135/tcp   filtered      msrpc
139/tcp   filtered      netbios-ssn
445/tcp   filtered      microsoft-ds
593/tcp   filtered      http-rpc-epmap
3306/tcp  open          mysql
4444/tcp  filtered      krb524
111/udp   open          rpcbind
123/udp   open|filtered ntp
135/udp   open|filtered msrpc
137/udp   open|filtered netbios-ns
139/udp   open|filtered netbios-ssn
445/udp   open|filtered microsoft-ds
1433/udp  open|filtered ms-sql-s
1434/udp  open|filtered ms-sql-m
1812/udp  open          radius
1813/udp  open|filtered radacct
17946/udp open|filtered unknown
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.17 - 2.6.36
Network Distance: 15 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Thu Sep 28 13:07:22 2017 -- 1 IP address (1 host up) scanned in 1100.73 seconds
Σ = 42 | Δt = 0.0047061443328857s