fail2ban bad ip database: ip 31.43.255.11

| ip database | live view | stats | report | help | api key:

ip: 31.43.255.11
hostname: dynpool-31.43.255.11.sevlush.net
country: [UA] Ukraine
first reported: 21.11.2018 03:12.10 GMT+0100
last reported: 30.11.2018 22:43.32 GMT+0100
time period: 9d 19h 31m 22s
total reports: 11
reported by: 2 host(s)
filter(s): sshd (6)
ssh (5)
tor exit node no
badips.com db
Lookup
  

port scan of '31.43.255.11':

[-hide]
# Nmap 6.40 scan initiated Wed Nov 21 03:13:01 2018 as: /usr/bin/nmap -sU -sS -O 31.43.255.11
Nmap scan report for dynpool-31.43.255.11.sevlush.net (31.43.255.11)
Host is up (0.027s latency).
Not shown: 1995 closed ports
PORT      STATE         SERVICE
22/tcp    open          ssh
53/tcp    open          domain
11111/tcp open          vce
53/udp    open          domain
111/udp   open|filtered rpcbind
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (95%), Linux 2.6.32 - 2.6.36 (93%), Linux 3.1 (93%), Linux 3.2 (93%), AXIS 210A or 211 Network Camera (Linux 2.6) (92%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (92%), Linux 2.4.26 (Slackware 10.0.0) (91%), Crestron XPanel control system (91%), Linux 3.3 - 3.6 (91%), Linux 3.7 - 3.9 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Nov 21 03:29:58 2018 -- 1 IP address (1 host up) scanned in 1017.43 seconds
Σ = 6 | Δt = 0.005728006362915s