fail2ban bad ip database: ip 185.230.11.74

| ip database | live view | stats | report | help | api key:

ip: 185.230.11.74
hostname: 185.230.11.74
country: [??] UNKNOWN
first reported: 20.11.2018 22:19.53 GMT+0100
last reported: 25.11.2018 19:29.07 GMT+0100
time period: 4d 21h 09m 14s
total reports: 10
reported by: 3 host(s)
filter(s): ssh (2)
sshd (8)
tor exit node no
badips.com db
Lookup
  

port scan of '185.230.11.74':

[-hide]
# Nmap 6.40 scan initiated Tue Nov 20 22:20:02 2018 as: /usr/bin/nmap -sU -sS -O 185.230.11.74
Nmap scan report for 185.230.11.74
Host is up (0.023s latency).
Not shown: 1986 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
80/tcp   open          http
139/tcp  open          netbios-ssn
445/tcp  open          microsoft-ds
5900/tcp open          vnc
6667/tcp open          irc
67/udp   open|filtered dhcps
68/udp   open|filtered dhcpc
69/udp   open|filtered tftp
137/udp  open          netbios-ns
138/udp  open|filtered netbios-dgm
520/udp  open|filtered route
631/udp  open|filtered ipp
5353/udp open          zeroconf
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (92%), HP P2000 G3 NAS device (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%), Linux 2.6.26 - 2.6.35 (90%), Linux 2.6.32 - 3.1 (90%), Linux 2.6.22 (90%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.0 - 3.9 (90%), Linux 3.3 (90%), OpenWrt White Russian 0.9 (Linux 2.4.30) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Nov 20 22:36:59 2018 -- 1 IP address (1 host up) scanned in 1018.08 seconds
Σ = 7 | Δt = 0.0043728351593018s