fail2ban bad ip database: ip 162.243.142.143

| ip database | live view | stats | report | help | api key:

ip: 162.243.142.143
hostname: honeypot.spu.college
country: [US] United States
first reported: 17.06.2018 21:35.13 GMT+0100
last reported: 26.11.2018 16:39.40 GMT+0100
time period: 161d 20h 04m 27s
total reports: 13
reported by: 2 host(s)
filter(s): sshd (13)
tor exit node no
badips.com db
Lookup
  

port scan of '162.243.142.143':

[-hide]
# Nmap 6.40 scan initiated Sun Jun 17 21:36:01 2018 as: /usr/bin/nmap -sU -sS -O 162.243.142.143
Nmap scan report for honeypot.spu.college (162.243.142.143)
Host is up (0.14s latency).
Not shown: 997 filtered ports, 997 open|filtered ports
PORT    STATE  SERVICE
22/tcp  open   ssh
80/tcp  open   http
443/tcp closed https
22/udp  closed ssh
80/udp  closed http
443/udp closed https
Aggressive OS guesses: Linux 2.6.26 - 2.6.35 (95%), Linux 3.0 (94%), Linux 3.0 - 3.9 (94%), Linux 2.6.23 - 2.6.38 (93%), Linux 2.6.32 (92%), Netgear DG834G WAP or Western Digital WD TV media player (92%), Linux 2.6.32 - 3.9 (92%), HP P2000 G3 NAS device (91%), Linux 2.6.8 - 2.6.27 (91%), Linux 2.6.22 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sun Jun 17 21:38:56 2018 -- 1 IP address (1 host up) scanned in 175.23 seconds
Σ = 32 | Δt = 0.0046961307525635s