fail2ban bad ip database: ip 209.141.50.57

| ip database | live view | stats | report | help | api key:

ip: 209.141.50.57
hostname: voxility-filtered
country: [US] United States
first reported: 19.11.2018 10:50.02 GMT+0200
last reported: 26.01.2019 10:50.35 GMT+0200
time period: 68d 33s
total reports: 10
reported by: 2 host(s)
filter(s): ssh (10)
tor exit node no
badips.com db
Lookup
  

port scan of '209.141.50.57':

[-hide]
# Nmap 6.40 scan initiated Mon Nov 19 10:51:01 2018 as: /usr/bin/nmap -sU -sS -O 209.141.50.57
Nmap scan report for voxility-filtered (209.141.50.57)
Host is up (0.14s latency).
Not shown: 1994 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
25/tcp   filtered      smtp
465/tcp  filtered      smtps
587/tcp  filtered      submission
68/udp   open|filtered dhcpc
1900/udp open|filtered upnp
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.2 (95%), Linux 3.1 (94%), AXIS 210A or 211 Network Camera (Linux 2.6) (94%), Linux 3.3 (93%), Linux 2.6.32 (93%), Linux 2.6.32 - 3.2 (93%), Linux 2.6.32 - 3.6 (92%), Linux 3.0 - 3.9 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Mon Nov 19 11:13:52 2018 -- 1 IP address (1 host up) scanned in 1370.65 seconds
Σ = 45 | Δt = 0.0123610496521s