fail2ban bad ip database: ip 213.120.170.33

| ip database | live view | stats | report | help | api key:

ip: 213.120.170.33
hostname: host213-120-170-33.in-addr.btopenworld.com
country: [GB] United Kingdom
first reported: 28.10.2017 10:20.22 GMT+0200
last reported: 11.03.2019 10:28.18 GMT+0200
time period: 499d 01h 07m 56s
total reports: 11
reported by: 3 host(s)
filter(s): ssh (9)
ssh (2)
tor exit node no
badips.com db
Lookup
  

port scan of '213.120.170.33':

[-hide]
# Nmap 6.40 scan initiated Sat Oct 28 10:21:02 2017 as: /usr/bin/nmap -sU -sS -O 213.120.170.33
Nmap scan report for host213-120-170-33.in-addr.btopenworld.com (213.120.170.33)
Host is up (0.18s latency).
Not shown: 1960 closed ports
PORT      STATE         SERVICE
23/tcp    open          telnet
30/tcp    open          unknown
80/tcp    open          http
81/tcp    open          hosts2-ns
306/tcp   open          unknown
465/tcp   open          smtps
514/tcp   open          shell
554/tcp   open          rtsp
1096/tcp  open          cnrprotocol
1117/tcp  open          ardus-mtrns
1169/tcp  open          tripwire
1805/tcp  open          enl-name
2001/tcp  open          dc
2041/tcp  open          interbase
2222/tcp  open          EtherNet/IP-1
3659/tcp  open          apple-sasl
3869/tcp  open          ovsam-mgmt
4000/tcp  open          remoteanything
4443/tcp  open          pharos
5850/tcp  open          unknown
6699/tcp  open          napster
7625/tcp  open          unknown
7777/tcp  open          cbt
8000/tcp  open          http-alt
8021/tcp  open          ftp-proxy
8181/tcp  open          unknown
8400/tcp  open          cvd
9003/tcp  open          unknown
9502/tcp  open          unknown
9877/tcp  open          unknown
16001/tcp open          fmsascon
23502/tcp open          unknown
51493/tcp open          unknown
52673/tcp open          unknown
62078/tcp open          iphone-sync
123/udp   open          ntp
6970/udp  open|filtered unknown
6971/udp  open|filtered unknown
7000/udp  open|filtered afs3-fileserver
32931/udp open|filtered unknown
Device type: general purpose|terminal|firewall|storage-misc
Running (JUST GUESSING): Linux 3.X|2.6.X (98%), IGEL Linux 2.6.X (91%), IPFire Linux 2.6.X (90%), Netgear RAIDiator 4.X (88%)
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:igel:linux_kernel:2.6 cpe:/o:ipfire:linux:2.6.32 cpe:/o:netgear:raidiator:4
Aggressive OS guesses: Linux 3.2 - 3.6 (98%), Linux 2.6.32 (96%), Linux 2.6.32 - 3.0 (95%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.15 - 2.6.26 (likely embedded) (92%), Linux 2.6.32 - 2.6.33 (92%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.31 - 2.6.32 (92%), Linux 2.6.38 (91%), Linux 2.6.39 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sat Oct 28 10:47:44 2017 -- 1 IP address (1 host up) scanned in 1602.90 seconds
Σ = 113 | Δt = 0.0084249973297119s