fail2ban bad ip database: ip 46.17.40.237

| ip database | live view | stats | report | help | api key:

ip: 46.17.40.237
hostname: 46.17.40.237
country: [RU] Russian Federation
first reported: 20.11.2018 09:38.02 GMT+0100
last reported: 26.11.2018 23:51.13 GMT+0100
time period: 6d 14h 13m 11s
total reports: 4
reported by: 2 host(s)
filter(s): sshd (3)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '46.17.40.237':

[-hide]
# Nmap 6.40 scan initiated Tue Nov 20 09:39:03 2018 as: /usr/bin/nmap -sU -sS -O 46.17.40.237
Nmap scan report for 46.17.40.237
Host is up (0.046s latency).
Not shown: 1988 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
80/tcp   open          http
139/tcp  filtered      netbios-ssn
179/tcp  filtered      bgp
5000/tcp filtered      upnp
8080/tcp open          http-proxy
22/udp   open|filtered ssh
80/udp   open|filtered http
123/udp  open          ntp
137/udp  open|filtered netbios-ns
138/udp  open|filtered netbios-dgm
139/udp  open|filtered netbios-ssn
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (95%), Linux 2.6.32 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.8 (93%), Linux 3.1 (93%), Linux 3.2 (93%), AXIS 210A or 211 Network Camera (Linux 2.6) (92%), Linux 2.6.26 - 2.6.35 (92%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.32 - 3.2 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Nov 20 10:00:14 2018 -- 1 IP address (1 host up) scanned in 1273.19 seconds
Σ = 6 | Δt = 0.0042541027069092s