fail2ban bad ip database: ip 192.163.226.125

| ip database | live view | stats | report | help | api key:

ip: 192.163.226.125
hostname: server.pablus.co
country: [US] United States
first reported: 24.06.2018 15:33.47 GMT+0200
last reported: 22.01.2019 16:33.02 GMT+0200
time period: 212d 01h 59m 15s
total reports: 11
reported by: 1 host(s)
filter(s): sasl (11)
tor exit node no
badips.com db
Lookup
  

port scan of '192.163.226.125':

[-hide]
# Nmap 6.40 scan initiated Sun Jun 24 15:34:02 2018 as: /usr/bin/nmap -sU -sS -O 192.163.226.125
Nmap scan report for server.pablus.co (192.163.226.125)
Host is up (0.17s latency).
Not shown: 1000 open|filtered ports, 979 filtered ports
PORT      STATE  SERVICE
21/tcp    open   ftp
22/tcp    closed ssh
25/tcp    open   smtp
53/tcp    open   domain
80/tcp    open   http
110/tcp   open   pop3
143/tcp   open   imap
443/tcp   open   https
587/tcp   open   submission
993/tcp   open   imaps
995/tcp   open   pop3s
5120/tcp  closed unknown
5190/tcp  closed aol
5200/tcp  closed targus-getdata
5900/tcp  closed vnc
6668/tcp  closed irc
8080/tcp  closed http-proxy
8651/tcp  closed unknown
8888/tcp  closed sun-answerbook
9415/tcp  closed unknown
32782/tcp closed unknown
No OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.40%E=4%D=6/24%OT=21%CT=22%CU=%PV=N%G=Y%TM=5B2FAF2A%P=x86_64-pc-
OS:linux-gnu)ECN(R=N)T1(R=N)T2(R=N)T3(R=N)T4(R=N)T5(R=N)T6(R=N)T7(R=N)U1(R=
OS:N)IE(R=N)


OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sun Jun 24 16:48:10 2018 -- 1 IP address (1 host up) scanned in 4448.84 seconds
Σ = 48 | Δt = 0.0042691230773926s