fail2ban bad ip database: ip 139.59.135.26

| ip database | live view | stats | report | help | api key:

ip: 139.59.135.26
hostname: 139.59.135.26
country: [AU] Australia
first reported: 20.11.2018 23:36.40 GMT+0100
last reported: 23.11.2018 20:07.10 GMT+0100
time period: 2d 20h 30m 30s
total reports: 10
reported by: 2 host(s)
filter(s): ssh (1)
sshd (9)
tor exit node no
badips.com db
Lookup
  

port scan of '139.59.135.26':

[-hide]
# Nmap 6.40 scan initiated Tue Nov 20 23:37:01 2018 as: /usr/bin/nmap -sU -sS -O 139.59.135.26
Nmap scan report for 139.59.135.26
Host is up (0.0081s latency).
Not shown: 997 open|filtered ports, 991 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   open   http
443/tcp  open   https
514/tcp  open   shell
3306/tcp open   mysql
8080/tcp open   http-proxy
8443/tcp open   https-alt
8888/tcp closed sun-answerbook
9001/tcp closed tor-orport
22/udp   closed ssh
80/udp   closed http
443/udp  closed https
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.18 - 2.6.22
Network Distance: 5 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Nov 20 23:37:40 2018 -- 1 IP address (1 host up) scanned in 39.04 seconds
Σ = 6 | Δt = 0.0038750171661377s