fail2ban bad ip database: ip 27.72.24.93

| ip database | live view | stats | report | help | api key:

ip: 27.72.24.93
hostname: 27.72.24.93
country: [VN] Vietnam
first reported: 30.10.2018 00:12.39 GMT+0100
last reported: 02.12.2018 23:41.23 GMT+0100
time period: 33d 23h 28m 44s
total reports: 5
reported by: 2 host(s)
filter(s): sshd (3)
ssh (2)
tor exit node no
badips.com db
Lookup
  

port scan of '27.72.24.93':

[-hide]
# Nmap 6.40 scan initiated Tue Oct 30 00:13:01 2018 as: /usr/bin/nmap -sU -sS -O 27.72.24.93
Nmap scan report for 27.72.24.93
Host is up (0.33s latency).
Not shown: 1628 filtered ports, 357 open|filtered ports
PORT     STATE  SERVICE
21/tcp   open   ftp
22/tcp   open   ssh
801/tcp  open   device
808/tcp  open   ccproxy-http
843/tcp  closed unknown
880/tcp  closed unknown
888/tcp  closed accessbuilder
3390/tcp open   dsc
8000/tcp closed http-alt
8001/tcp closed vcom-tunnel
8080/tcp closed http-proxy
8081/tcp closed blackice-icecap
8443/tcp open   https-alt
8000/udp closed irdmi
8001/udp closed vcom-tunnel
Aggressive OS guesses: Linux 2.6.32 - 2.6.35 (94%), Fortinet FortiAnalyzer 400B firewall (Linux 2.6) (93%), Linux 2.6.32 (92%), Linux 2.6.35 (92%), DD-WRT v24-sp1 (Linux 2.4) (91%), Tandberg VCS video conferencing system (91%), Check Point UTM-1 Edge X firewall (90%), Cisco SA520 firewall (Linux 2.6) (90%), IGEL UD3 thin client (Linux 2.6) (90%), DD-WRT v23 (Linux 2.4.34) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Oct 30 00:57:11 2018 -- 1 IP address (1 host up) scanned in 2650.66 seconds
Σ = 12 | Δt = 0.0065338611602783s