fail2ban bad ip database: ip 45.55.254.13

| ip database | live view | stats | report | help | api key:

ip: 45.55.254.13
hostname: 45.55.254.13
country: [??] UNKNOWN
first reported: 21.11.2018 04:07.40 GMT+0200
last reported: 06.03.2019 11:37.57 GMT+0200
time period: 105d 07h 30m 17s
total reports: 11
reported by: 2 host(s)
filter(s): ssh (11)
tor exit node no
badips.com db
Lookup
  

port scan of '45.55.254.13':

[-hide]
# Nmap 6.40 scan initiated Wed Nov 21 04:08:02 2018 as: /usr/bin/nmap -sU -sS -O 45.55.254.13
Nmap scan report for 45.55.254.13
Host is up (0.080s latency).
Not shown: 1991 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
80/tcp   open          http
3306/tcp open          mysql
4848/tcp open          appserv-http
7676/tcp open          imqbrokerd
8080/tcp open          http-proxy
8181/tcp open          unknown
631/udp  open|filtered ipp
5353/udp open|filtered zeroconf
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (95%), Linux 2.6.32 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.8 (93%), Linux 3.1 (93%), Linux 3.2 (93%), AXIS 210A or 211 Network Camera (Linux 2.6) (92%), Linux 2.6.26 - 2.6.35 (92%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.32 - 3.2 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 6 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Nov 21 04:24:51 2018 -- 1 IP address (1 host up) scanned in 1009.78 seconds
Σ = 55 | Δt = 0.0041871070861816s