fail2ban bad ip database: ip 45.119.212.105

| ip database | live view | stats | report | help | api key:

ip: 45.119.212.105
hostname: 45.119.212.105
country: [??] UNKNOWN
first reported: 17.11.2018 23:04.11 GMT+0200
last reported: 27.04.2019 01:18.46 GMT+0200
time period: 160d 01h 14m 35s
total reports: 11
reported by: 2 host(s)
filter(s): ssh (6)
ssh (5)
tor exit node no
badips.com db
Lookup
  

port scan of '45.119.212.105':

[-hide]
# Nmap 6.40 scan initiated Sat Nov 17 23:05:02 2018 as: /usr/bin/nmap -sU -sS -O 45.119.212.105
WARNING: RST from 45.119.212.105 port 22 -- is this port really open?
WARNING: RST from 45.119.212.105 port 22 -- is this port really open?
WARNING: RST from 45.119.212.105 port 22 -- is this port really open?
WARNING: RST from 45.119.212.105 port 22 -- is this port really open?
WARNING: RST from 45.119.212.105 port 22 -- is this port really open?
WARNING: RST from 45.119.212.105 port 22 -- is this port really open?
Nmap scan report for 45.119.212.105
Host is up (0.13s latency).
Not shown: 1992 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
80/tcp   open          http
445/tcp  filtered      microsoft-ds
3306/tcp open          mysql
137/udp  open|filtered netbios-ns
138/udp  open|filtered netbios-dgm
139/udp  open|filtered netbios-ssn
1434/udp open|filtered ms-sql-m
Device type: general purpose
Running: Linux 2.4.X
OS CPE: cpe:/o:linux:linux_kernel:2.4.21
OS details: Linux 2.4.21
Network Distance: 15 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sat Nov 17 23:23:20 2018 -- 1 IP address (1 host up) scanned in 1098.73 seconds
Σ = 66 | Δt = 0.0039210319519043s