fail2ban bad ip database: ip 139.59.96.172

| ip database | live view | stats | report | help | api key:

ip: 139.59.96.172
hostname: 139.59.96.172
country: [AU] Australia
first reported: 20.11.2018 22:28.07 GMT+0100
last reported: 25.11.2018 18:57.19 GMT+0100
time period: 4d 20h 29m 12s
total reports: 11
reported by: 2 host(s)
filter(s): sshd (6)
ssh (5)
tor exit node no
badips.com db
Lookup
  

port scan of '139.59.96.172':

[-hide]
# Nmap 6.40 scan initiated Tue Nov 20 22:29:01 2018 as: /usr/bin/nmap -sU -sS -O 139.59.96.172
Nmap scan report for 139.59.96.172
Host is up (0.16s latency).
Not shown: 997 filtered ports, 997 open|filtered ports
PORT    STATE  SERVICE
22/tcp  open   ssh
80/tcp  open   http
443/tcp open   https
22/udp  closed ssh
80/udp  closed http
443/udp closed https
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 2.6.32 (95%), Linux 3.8 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.0 - 3.9 (95%), Netgear DG834G WAP or Western Digital WD TV media player (94%), Linux 2.6.23 - 2.6.38 (93%), Linux 3.1 (92%), Linux 3.2 (92%), AXIS 210A or 211 Network Camera (Linux 2.6) (92%), Linux 2.6.32 - 2.6.35 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Nov 20 22:41:28 2018 -- 1 IP address (1 host up) scanned in 746.56 seconds
Σ = 6 | Δt = 0.0031769275665283s