fail2ban bad ip database: ip 175.139.241.9

| ip database | live view | stats | report | help | api key:

ip: 175.139.241.9
hostname: 175.139.241.9
country: [MY] Malaysia
first reported: 18.02.2015 20:22.23 GMT+0200
last reported: 04.03.2019 14:23.47 GMT+0200
time period: 1474d 18h 01m 24s
total reports: 27
reported by: 3 host(s)
filter(s): ssh (26)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '175.139.241.9':

[-hide]
# Nmap 6.40 scan initiated Mon Mar  4 14:24:03 2019 as: /usr/bin/nmap -sU -sS -O 175.139.241.9
Nmap scan report for 175.139.241.9
Host is up (0.17s latency).
Not shown: 999 open|filtered ports, 994 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
113/tcp  closed ident
443/tcp  open   https
1723/tcp open   pptp
7443/tcp open   oracleas-https
8443/tcp open   https-alt
22/udp   closed ssh
Device type: general purpose|WAP|webcam|firewall|broadband router
Running (JUST GUESSING): Linux 3.X|2.6.X|2.4.X (93%), Tandberg embedded (87%), Fortinet Linux 2.6.X (87%), IPFire Linux 2.6.X (86%)
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4 cpe:/h:tandberg:vcs cpe:/o:fortinet:linux_kernel:2.6 cpe:/o:ipfire:linux:2.6.32
Aggressive OS guesses: Linux 3.4 (93%), Linux 2.6.39 (93%), Linux 2.6.32 (93%), Linux 3.1.9 (92%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.32 - 3.0 (90%), Linux 3.2 - 3.6 (89%), Linux 3.5 (89%), Linux 2.6.35 (88%), Linux 2.6.38 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 6 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Mon Mar  4 14:24:31 2019 -- 1 IP address (1 host up) scanned in 29.73 seconds
Σ = 34 | Δt = 0.0056400299072266s