fail2ban bad ip database: ip 192.99.14.119

| ip database | live view | stats | report | help | api key:

ip: 192.99.14.119
hostname: ns509222.ip-192-99-14.net
country: [CA] Canada
first reported: 15.11.2018 20:00.10 GMT+0100
last reported: 26.11.2018 13:52.08 GMT+0100
time period: 10d 17h 51m 58s
total reports: 10
reported by: 3 host(s)
filter(s): sshd (7)
ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '192.99.14.119':

[-hide]
# Nmap 6.40 scan initiated Thu Nov 15 20:01:02 2018 as: /usr/bin/nmap -sU -sS -O 192.99.14.119
Nmap scan report for ns509222.ip-192-99-14.net (192.99.14.119)
Host is up (0.085s latency).
Not shown: 1991 closed ports
PORT      STATE         SERVICE
22/tcp    open          ssh
80/tcp    open          http
445/tcp   filtered      microsoft-ds
3389/tcp  open          ms-wbt-server
10000/tcp open          snet-sensor-mgmt
123/udp   open          ntp
631/udp   open|filtered ipp
5353/udp  open|filtered zeroconf
10000/udp open          ndmp
Aggressive OS guesses: Linux 2.6.32 (96%), Linux 2.6.32 - 3.9 (96%), Netgear DG834G WAP or Western Digital WD TV media player (95%), Linux 3.8 (95%), Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6) (94%), Linux 2.6.26 - 2.6.35 (94%), Linux 2.6.32 - 2.6.35 (94%), Linux 2.6.32 - 3.2 (94%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Thu Nov 15 20:23:12 2018 -- 1 IP address (1 host up) scanned in 1330.89 seconds
Σ = 6 | Δt = 0.0050098896026611s