fail2ban bad ip database: ip 140.143.230.156

| ip database | live view | stats | report | help | api key:

ip: 140.143.230.156
hostname: 140.143.230.156
country: [CN] China
first reported: 16.11.2018 23:51.56 GMT+0100
last reported: 09.12.2018 02:16.37 GMT+0100
time period: 22d 02h 24m 41s
total reports: 9
reported by: 2 host(s)
filter(s): sshd (5)
ssh (4)
tor exit node no
badips.com db
Lookup
  

port scan of '140.143.230.156':

[-hide]
# Nmap 6.40 scan initiated Fri Nov 16 23:52:02 2018 as: /usr/bin/nmap -sU -sS -O 140.143.230.156
Nmap scan report for 140.143.230.156
Host is up (0.22s latency).
Not shown: 1989 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
111/tcp  open          rpcbind
445/tcp  filtered      microsoft-ds
5800/tcp filtered      vnc-http
5900/tcp filtered      vnc
68/udp   open|filtered dhcpc
111/udp  open|filtered rpcbind
1014/udp open|filtered unknown
1026/udp open|filtered win-rpc
1027/udp open|filtered unknown
1434/udp open|filtered ms-sql-m
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (91%), Linux 3.1 (90%), Linux 3.2 (90%), AXIS 210A or 211 Network Camera (Linux 2.6) (90%), Android 4.1.1 (89%), Linux 3.1 - 3.2 (89%), Linux 3.3 - 3.6 (89%), Linux 3.7 - 3.9 (89%), Linux 2.6.32 - 3.6 (88%), Linux 2.6.32 - 3.9 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sat Nov 17 00:15:03 2018 -- 1 IP address (1 host up) scanned in 1381.19 seconds
Σ = 7 | Δt = 0.0038070678710938s