fail2ban bad ip database: ip 54.36.189.143

| ip database | live view | stats | report | help | api key:

ip: 54.36.189.143
hostname: 143.ip-54-36-189.eu
country: [US] United States
first reported: 21.11.2018 02:20.59 GMT+0200
last reported: 22.02.2019 07:29.41 GMT+0200
time period: 93d 05h 08m 42s
total reports: 12
reported by: 3 host(s)
filter(s): ssh (2)
ssh (10)
tor exit node no
badips.com db
Lookup
  

port scan of '54.36.189.143':

[-hide]
# Nmap 6.40 scan initiated Wed Nov 21 02:21:02 2018 as: /usr/bin/nmap -sU -sS -O 54.36.189.143
Nmap scan report for 143.ip-54-36-189.eu (54.36.189.143)
Host is up (0.018s latency).
Not shown: 997 filtered ports, 997 open|filtered ports
PORT    STATE  SERVICE
22/tcp  open   ssh
80/tcp  open   http
443/tcp closed https
22/udp  closed ssh
80/udp  closed http
443/udp closed https
Aggressive OS guesses: Linux 3.0 - 3.9 (94%), Linux 2.6.26 - 2.6.35 (94%), Linux 3.0 (94%), Linux 2.6.23 - 2.6.38 (93%), Linux 2.6.32 (92%), Netgear DG834G WAP or Western Digital WD TV media player (92%), Linux 2.6.32 - 3.9 (92%), HP P2000 G3 NAS device (91%), Linux 2.6.8 - 2.6.27 (91%), Linux 2.6.22 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Nov 21 02:21:31 2018 -- 1 IP address (1 host up) scanned in 30.05 seconds
Σ = 53 | Δt = 0.0036790370941162s