fail2ban bad ip database: ip 2.237.133.169

| ip database | live view | stats | report | help | api key:

ip: 2.237.133.169
hostname: 2.237.133.169
country: [IT] Italy
first reported: 30.09.2018 15:52.11 GMT+0200
last reported: 11.01.2019 14:35.29 GMT+0200
time period: 102d 23h 43m 18s
total reports: 3
reported by: 3 host(s)
filter(s): ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '2.237.133.169':

[-hide]
# Nmap 6.40 scan initiated Sun Sep 30 15:53:02 2018 as: /usr/bin/nmap -sU -sS -O 2.237.133.169
Nmap scan report for 2.237.133.169
Host is up (0.047s latency).
Not shown: 1000 open|filtered ports, 989 filtered ports
PORT     STATE SERVICE
20/tcp   open  ftp-data
21/tcp   open  ftp
22/tcp   open  ssh
80/tcp   open  http
443/tcp  open  https
445/tcp  open  microsoft-ds
990/tcp  open  ftps
3306/tcp open  mysql
3389/tcp open  ms-wbt-server
5800/tcp open  vnc-http
5900/tcp open  vnc
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: FreeBSD 6.2-RELEASE (90%), FreeBSD 5.5-RELEASE (89%), Microsoft Windows Server 2008 Beta 3 (88%), Tomato 1.27 - 1.28 (Linux 2.4.20) (88%), Isilon IQ 200 NAS device (87%), VMware ESXi Server 4.0 (87%), m0nowall 1.3b16 firewall (FreeBSD 6.3-RELEASE) (86%), VMware ESXi Server 3.5 (86%), Linux 2.6.18 - 2.6.22 (86%), VMware ESXi Server 4.1.0 (85%)
No exact OS matches for host (test conditions non-ideal).

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sun Sep 30 15:57:44 2018 -- 1 IP address (1 host up) scanned in 282.51 seconds
Σ = 48 | Δt = 0.00478196144104s