fail2ban bad ip database: ip 220.134.195.68

| ip database | live view | stats | report | help | api key:

ip: 220.134.195.68
hostname: 220-134-195-68.HINET-IP.hinet.net
country: [TW] Taiwan
first reported: 18.09.2018 21:39.30 GMT+0100
last reported: 05.01.2019 16:38.38 GMT+0100
time period: 108d 19h 59m 08s
total reports: 11
reported by: 1 host(s)
filter(s): sasl (11)
tor exit node no
badips.com db
Lookup
  

port scan of '220.134.195.68':

[-hide]
# Nmap 6.40 scan initiated Tue Sep 18 21:40:04 2018 as: /usr/bin/nmap -sU -sS -O 220.134.195.68
Nmap scan report for 220-134-195-68.HINET-IP.hinet.net (220.134.195.68)
Host is up (0.25s latency).
Not shown: 1983 closed ports
PORT     STATE         SERVICE
80/tcp   open          http
139/tcp  open          netbios-ssn
443/tcp  open          https
445/tcp  open          microsoft-ds
515/tcp  open          printer
554/tcp  open          rtsp
1720/tcp filtered      H.323/Q.931
3306/tcp open          mysql
3389/tcp filtered      ms-wbt-server
7777/tcp open          cbt
8000/tcp open          http-alt
137/udp  open          netbios-ns
138/udp  open|filtered netbios-dgm
514/udp  open|filtered syslog
2049/udp open|filtered nfs
3389/udp open|filtered ms-wbt-server
5353/udp open          zeroconf
Aggressive OS guesses: Linksys WRV54G WAP (98%), Linksys RV042 router (96%), Extreme Networks Summit X450e switch (ExtremeXOS 15.3) (95%), Linux 2.4.18 - 2.4.35 (likely embedded) (95%), Linux 2.6.9 - 2.6.33 (95%), Android 1.5 (Linux 2.6.27) (95%), Android 1.5 - 1.6 (Linux 2.6.27) (95%), Snom 360 VoIP phone (95%), Supermicro IPMI remote management (95%), Linux 2.6.17 (95%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Sep 18 22:00:52 2018 -- 1 IP address (1 host up) scanned in 1249.51 seconds
Σ = 29 | Δt = 0.01642107963562s