fail2ban bad ip database: ip 140.143.251.251

| ip database | live view | stats | report | help | api key:

ip: 140.143.251.251
hostname: 140.143.251.251
country: [CN] China
first reported: 30.09.2018 12:38.41 GMT+0200
last reported: 14.02.2019 05:49.38 GMT+0200
time period: 136d 18h 10m 57s
total reports: 3
reported by: 2 host(s)
filter(s): apache-nokiddies (1)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '140.143.251.251':

[-hide]
# Nmap 6.40 scan initiated Sun Sep 30 12:39:02 2018 as: /usr/bin/nmap -sU -sS -O 140.143.251.251
WARNING: RST from 140.143.251.251 port 22 -- is this port really open?
WARNING: RST from 140.143.251.251 port 22 -- is this port really open?
WARNING: RST from 140.143.251.251 port 22 -- is this port really open?
WARNING: RST from 140.143.251.251 port 22 -- is this port really open?
Nmap scan report for 140.143.251.251
Host is up (0.37s latency).
Not shown: 999 open|filtered ports, 995 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   closed http
443/tcp  closed https
3389/tcp closed ms-wbt-server
8080/tcp closed http-proxy
500/udp  open   isakmp
Device type: general purpose
Running: Linux 2.4.X
OS CPE: cpe:/o:linux:linux_kernel:2.4.21
OS details: Linux 2.4.21

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sun Sep 30 12:41:53 2018 -- 1 IP address (1 host up) scanned in 172.15 seconds
Σ = 88 | Δt = 0.0052120685577393s