fail2ban bad ip database: ip 168.215.93.140

| ip database | live view | stats | report | help | api key:

ip: 168.215.93.140
hostname: 168.215.93.140
country: [US] United States
first reported: 20.11.2018 12:12.11 GMT+0100
last reported: 28.11.2018 16:43.23 GMT+0100
time period: 8d 04h 31m 12s
total reports: 10
reported by: 4 host(s)
filter(s): sshd (8)
ssh (2)
tor exit node no
badips.com db
Lookup
  

port scan of '168.215.93.140':

[-hide]
# Nmap 6.40 scan initiated Tue Nov 20 12:13:01 2018 as: /usr/bin/nmap -sU -sS -O 168.215.93.140
Nmap scan report for 168.215.93.140
Host is up (0.11s latency).
Not shown: 1727 closed ports, 153 filtered ports, 117 open|filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
161/udp open  snmp
Device type: general purpose|WAP|webcam|firewall
Running (JUST GUESSING): Linux 2.6.X|2.4.X|3.X (91%), Tandberg embedded (90%), Fortinet Linux 2.6.X (87%), IPFire Linux 2.6.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.35 cpe:/o:linux:linux_kernel:2.4 cpe:/h:tandberg:vcs cpe:/o:linux:linux_kernel:3 cpe:/o:fortinet:linux_kernel:2.6 cpe:/o:ipfire:linux:2.6.32
Aggressive OS guesses: Linux 2.6.35 (91%), DD-WRT v24-sp1 (Linux 2.4) (91%), Linux 2.6.32 (91%), Tandberg VCS video conferencing system (90%), Linux 3.1.9 (90%), Linux 3.5 (89%), Linux 3.4 (88%), Linux 2.6.39 (88%), Linux 2.6.18 - 2.6.22 (87%), Linux 2.6.32 - 2.6.35 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Nov 20 12:49:27 2018 -- 1 IP address (1 host up) scanned in 2186.49 seconds
Σ = 8 | Δt = 0.0038208961486816s