fail2ban bad ip database: ip 161.132.195.76

| ip database | live view | stats | report | help | api key:

ip: 161.132.195.76
hostname: 161.132.195.76
country: [PE] Peru
first reported: 21.11.2018 08:58.58 GMT+0100
last reported: 29.11.2018 23:16.01 GMT+0100
time period: 8d 14h 17m 03s
total reports: 10
reported by: 2 host(s)
filter(s): sshd (6)
ssh (4)
tor exit node no
badips.com db
Lookup
  

port scan of '161.132.195.76':

[-hide]
# Nmap 6.40 scan initiated Wed Nov 21 08:59:02 2018 as: /usr/bin/nmap -sU -sS -O 161.132.195.76
Nmap scan report for 161.132.195.76
Host is up (0.17s latency).
Not shown: 999 open|filtered ports, 997 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
113/tcp  closed ident
5432/tcp open   postgresql
520/udp  closed route
Device type: firewall|general purpose|terminal|WAP|printer
Running (JUST GUESSING): IPFire Linux 2.6.X (90%), Linux 3.X|2.6.X|2.4.X (89%), IGEL Linux 2.6.X (88%), Kyocera embedded (86%)
OS CPE: cpe:/o:ipfire:linux:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:igel:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4 cpe:/h:kyocera:cs-2560
Aggressive OS guesses: IPFire firewall 2.11 (Linux 2.6.32) (90%), Linux 3.2 - 3.6 (89%), Linux 2.6.32 (89%), Linux 2.6.18 - 2.6.22 (88%), IGEL UD3 thin client (Linux 2.6) (88%), Linux 2.6.35 (88%), DD-WRT v24-sp1 (Linux 2.4) (87%), Linux 3.0 - 3.2 (87%), Linux 2.6.32 - 2.6.39 (87%), Linux 3.5 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 16 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Nov 21 08:59:44 2018 -- 1 IP address (1 host up) scanned in 42.43 seconds
Σ = 6 | Δt = 0.0058591365814209s