fail2ban bad ip database: ip 195.22.141.33

| ip database | live view | stats | report | help | api key:

ip: 195.22.141.33
hostname: 195.22.141.33.users.bel.com.ua
country: [UA] Ukraine
first reported: 19.09.2018 18:03.05 GMT+0100
last reported: 24.02.2019 00:11.30 GMT+0100
time period: 157d 07h 08m 25s
total reports: 12
reported by: 4 host(s)
filter(s): sshd (9)
ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '195.22.141.33':

[-hide]
# Nmap 6.40 scan initiated Wed Sep 19 18:04:02 2018 as: /usr/bin/nmap -sU -sS -O 195.22.141.33
Nmap scan report for 195.22.141.33.users.bel.com.ua (195.22.141.33)
Host is up (0.037s latency).
Not shown: 1988 closed ports
PORT    STATE         SERVICE
21/tcp  open          ftp
22/tcp  open          ssh
25/tcp  open          smtp
53/tcp  open          domain
80/tcp  open          http
139/tcp filtered      netbios-ssn
443/tcp open          https
53/udp  open          domain
67/udp  open|filtered dhcps
111/udp open|filtered rpcbind
137/udp open|filtered netbios-ns
138/udp open|filtered netbios-dgm
Aggressive OS guesses: Linux 2.6.26 - 2.6.35 (95%), Linux 3.0 (94%), Linux 3.0 - 3.9 (94%), Linux 2.6.23 - 2.6.38 (93%), Linux 2.6.32 (92%), Netgear DG834G WAP or Western Digital WD TV media player (92%), Linux 2.6.32 - 3.9 (92%), HP P2000 G3 NAS device (91%), Linux 2.6.8 - 2.6.27 (91%), Linux 2.6.22 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Sep 19 18:21:06 2018 -- 1 IP address (1 host up) scanned in 1024.72 seconds
Σ = 33 | Δt = 0.0049788951873779s