fail2ban bad ip database: ip 212.44.65.22

| ip database | live view | stats | report | help | api key:

ip: 212.44.65.22
hostname: ip65-22.gazinter.net
country: [RU] Russian Federation
first reported: 19.09.2018 11:46.58 GMT+0100
last reported: 26.11.2018 23:06.23 GMT+0100
time period: 68d 12h 19m 25s
total reports: 10
reported by: 3 host(s)
filter(s): sshd (10)
tor exit node no
badips.com db
Lookup
  

port scan of '212.44.65.22':

[-hide]
# Nmap 6.40 scan initiated Wed Sep 19 11:47:02 2018 as: /usr/bin/nmap -sU -sS -O 212.44.65.22
Nmap scan report for ip65-22.gazinter.net (212.44.65.22)
Host is up (0.063s latency).
Not shown: 1965 closed ports
PORT      STATE         SERVICE
21/tcp    open          ftp
22/tcp    open          ssh
25/tcp    open          smtp
80/tcp    open          http
135/tcp   filtered      msrpc
139/tcp   filtered      netbios-ssn
445/tcp   filtered      microsoft-ds
1039/tcp  open          sbl
1043/tcp  open          boinc
1801/tcp  open          msmq
2103/tcp  open          zephyr-clt
2105/tcp  open          eklogin
2107/tcp  open          msmq-mgmt
2869/tcp  open          icslap
3389/tcp  open          ms-wbt-server
5432/tcp  open          postgresql
8021/tcp  open          ftp-proxy
8022/tcp  open          oa-system
8888/tcp  open          sun-answerbook
8899/tcp  open          ospf-lite
27000/tcp open          flexlm0
123/udp   open          ntp
135/udp   open|filtered msrpc
137/udp   open          netbios-ns
138/udp   open|filtered netbios-dgm
139/udp   open|filtered netbios-ssn
445/udp   open|filtered microsoft-ds
500/udp   open|filtered isakmp
1037/udp  open|filtered ams
1042/udp  open|filtered afrog
1056/udp  open|filtered vfo
1900/udp  open|filtered upnp
3456/udp  open|filtered IISrpc-or-vat
4500/udp  open|filtered nat-t-ike
20445/udp open|filtered unknown
Device type: general purpose|media device|phone
Running (JUST GUESSING): Microsoft Windows XP|2003|2000|2008|PocketPC/CE (95%), Motorola Windows PocketPC/CE (90%)
OS CPE: cpe:/o:microsoft:windows_xp::sp3:professional cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_2000::sp4 cpe:/o:motorola:windows_ce cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_ce
Aggressive OS guesses: Microsoft Windows XP Professional SP3 (95%), Microsoft Windows XP SP2 or SP3 (95%), Microsoft Windows XP SP3 (95%), Microsoft Windows XP SP2 (firewall disabled) (94%), Microsoft Windows Server 2003 SP2 (93%), Microsoft Windows 2000 SP4 (92%), Microsoft Windows Server 2003 (92%), Microsoft Windows XP SP2 (92%), Microsoft Windows XP SP2 or Windows Server 2003 (92%), Microsoft Windows XP SP2 or Windows Small Business Server 2003 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Sep 19 11:53:57 2018 -- 1 IP address (1 host up) scanned in 415.86 seconds
Σ = 18 | Δt = 0.0048489570617676s