fail2ban bad ip database: ip 200.60.16.59

| ip database | live view | stats | report | help | api key:

ip: 200.60.16.59
hostname: 200.60.16.59
country: [PE] Peru
first reported: 30.10.2018 07:58.54 GMT+0100
last reported: 02.12.2018 18:37.51 GMT+0100
time period: 33d 10h 38m 57s
total reports: 4
reported by: 3 host(s)
filter(s): sshd (3)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '200.60.16.59':

[-hide]
# Nmap 6.40 scan initiated Tue Oct 30 07:59:02 2018 as: /usr/bin/nmap -sU -sS -O 200.60.16.59
Nmap scan report for 200.60.16.59
Host is up (0.41s latency).
Not shown: 1984 closed ports
PORT      STATE         SERVICE
22/tcp    open          ssh
80/tcp    open          http
111/tcp   open          rpcbind
5432/tcp  open          postgresql
9898/tcp  open          monkeycom
111/udp   open          rpcbind
123/udp   open          ntp
138/udp   open|filtered netbios-dgm
33030/udp open|filtered unknown
34038/udp open|filtered unknown
37783/udp open|filtered unknown
40866/udp open|filtered unknown
43824/udp open|filtered unknown
44190/udp open|filtered unknown
49166/udp open|filtered unknown
55043/udp open|filtered unknown
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.32 - 3.9 (90%), Netgear DG834G WAP or Western Digital WD TV media player (90%), Linux 3.8 (89%), Linux 3.0 (88%), Linux 2.6.26 - 2.6.35 (88%), Linux 3.1 (88%), Linux 3.2 (88%), Linux 2.6.32 - 2.6.35 (87%), Linux 2.6.32 - 3.2 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Oct 30 08:19:03 2018 -- 1 IP address (1 host up) scanned in 1201.94 seconds
Σ = 12 | Δt = 0.016274213790894s