fail2ban bad ip database: ip 220.133.209.148

| ip database | live view | stats | report | help | api key:

ip: 220.133.209.148
hostname: 220-133-209-148.HINET-IP.hinet.net
country: [TW] Taiwan
first reported: 15.09.2018 05:18.10 GMT+0100
last reported: 25.11.2018 14:44.57 GMT+0100
time period: 71d 10h 26m 47s
total reports: 10
reported by: 4 host(s)
filter(s): sshd (9)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '220.133.209.148':

[-hide]
# Nmap 6.40 scan initiated Sat Sep 15 05:19:02 2018 as: /usr/bin/nmap -sU -sS -O 220.133.209.148
Nmap scan report for 220-133-209-148.HINET-IP.hinet.net (220.133.209.148)
Host is up (0.22s latency).
Not shown: 997 open|filtered ports, 994 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   open   http
3333/tcp closed dec-notes
8000/tcp open   http-alt
8080/tcp open   http-proxy
9001/tcp open   tor-orport
22/udp   closed ssh
80/udp   closed http
8000/udp closed irdmi
Aggressive OS guesses: OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (94%), Netgear DG834G WAP or Western Digital WD TV media player (92%), HP P2000 G3 NAS device (91%), Linux 2.6.26 - 2.6.35 (90%), Linux 2.6.32 - 3.4.1 (90%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.0 (90%), Linux 2.6.22 (90%), Linux 3.0 - 3.9 (90%), OpenWrt White Russian 0.9 (Linux 2.4.30) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sat Sep 15 05:19:39 2018 -- 1 IP address (1 host up) scanned in 37.17 seconds
Σ = 16 | Δt = 0.0041661262512207s