fail2ban bad ip database: ip 54.39.106.81

| ip database | live view | stats | report | help | api key:

ip: 54.39.106.81
hostname: ns560302.ip-54-39-106.net
country: [US] United States
first reported: 17.09.2018 13:12.40 GMT+0200
last reported: 21.02.2019 20:12.18 GMT+0200
time period: 157d 07h 59m 38s
total reports: 13
reported by: 3 host(s)
filter(s): ssh (9)
ssh (4)
tor exit node no
badips.com db
Lookup
  

port scan of '54.39.106.81':

[-hide]
# Nmap 6.40 scan initiated Mon Sep 17 13:13:02 2018 as: /usr/bin/nmap -sU -sS -O 54.39.106.81
Nmap scan report for ns560302.ip-54-39-106.net (54.39.106.81)
Host is up (0.085s latency).
Not shown: 1989 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
80/tcp   open          http
139/tcp  open          netbios-ssn
445/tcp  filtered      microsoft-ds
8080/tcp open          http-proxy
123/udp  open          ntp
137/udp  open          netbios-ns
138/udp  open|filtered netbios-dgm
631/udp  open|filtered ipp
1900/udp open|filtered upnp
5353/udp open|filtered zeroconf
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (95%), Linux 2.6.32 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.8 (93%), Linux 3.1 (93%), Linux 3.2 (93%), AXIS 210A or 211 Network Camera (Linux 2.6) (92%), Linux 2.6.26 - 2.6.35 (92%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.32 - 3.2 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 10 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Mon Sep 17 13:35:44 2018 -- 1 IP address (1 host up) scanned in 1363.28 seconds
Σ = 62 | Δt = 0.005774974822998s