fail2ban bad ip database: ip 37.49.207.240

| ip database | live view | stats | report | help | api key:

ip: 37.49.207.240
hostname: host-37-49-207-240.bbcustomer.zsttk.net
country: [RU] Russian Federation
first reported: 18.11.2018 00:32.06 GMT+0100
last reported: 29.11.2018 16:33.45 GMT+0100
time period: 11d 16h 01m 39s
total reports: 10
reported by: 3 host(s)
filter(s): sshd (7)
ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '37.49.207.240':

[-hide]
# Nmap 6.40 scan initiated Sun Nov 18 00:33:01 2018 as: /usr/bin/nmap -sU -sS -O 37.49.207.240
Nmap scan report for host-37-49-207-240.bbcustomer.zsttk.net (37.49.207.240)
Host is up (0.093s latency).
Not shown: 999 open|filtered ports, 988 filtered ports
PORT     STATE  SERVICE
21/tcp   open   ftp
22/tcp   open   ssh
53/tcp   open   domain
80/tcp   open   http
111/tcp  closed rpcbind
443/tcp  open   https
554/tcp  closed rtsp
993/tcp  closed imaps
1025/tcp closed NFS-or-IIS
1723/tcp open   pptp
5900/tcp closed vnc
8000/tcp open   http-alt
8888/tcp closed sun-answerbook
No OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.40%E=4%D=11/18%OT=21%CT=111%CU=%PV=N%G=Y%TM=5BF0B427%P=x86_64-p
OS:c-linux-gnu)ECN(R=N)T1(R=N)T2(R=N)T3(R=N)T4(R=N)T5(R=N)T6(R=N)T7(R=N)U1(
OS:R=N)IE(R=N)


OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sun Nov 18 01:36:55 2018 -- 1 IP address (1 host up) scanned in 3833.72 seconds
Σ = 7 | Δt = 0.0060489177703857s