fail2ban bad ip database: ip 60.255.146.181

| ip database | live view | stats | report | help | api key:

ip: 60.255.146.181
hostname: 60.255.146.181
country: [CN] China
first reported: 25.03.2017 06:58.42 GMT+0200
last reported: 17.04.2019 18:25.14 GMT+0200
time period: 753d 10h 26m 32s
total reports: 8
reported by: 3 host(s)
filter(s): ssh (8)
tor exit node no
badips.com db
Lookup
  

port scan of '60.255.146.181':

[-hide]
# Nmap 6.40 scan initiated Sun Jul 23 19:56:03 2017 as: /usr/bin/nmap -sU -sS -O 60.255.146.181
Nmap scan report for 60.255.146.181
Host is up (0.35s latency).
Not shown: 999 open|filtered ports, 992 filtered ports
PORT     STATE  SERVICE
1723/tcp open   pptp
2222/tcp open   EtherNet/IP-1
7000/tcp open   afs3-fileserver
7001/tcp open   afs3-callback
7002/tcp open   afs3-prserver
9000/tcp open   cslistener
9001/tcp open   tor-orport
9500/tcp open   ismserver
9001/udp closed etlservicemgr
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 2.6.31 - 2.6.35 (99%), Linux 2.6.32 (99%), HP P2000 G3 NAS device (96%), Linux 2.6.19 - 2.6.36 (96%), Linux 2.6.15 - 2.6.30 (95%), Linux 2.6.23 - 2.6.38 (95%), Linux 2.6.32 - 2.6.33 (95%), Check Point VPN-1 UTM appliance (94%), DD-WRT v23 (Linux 2.4.37) (94%), DD-WRT v24-sp2 (Linux 2.6.34) (94%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 25 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sun Jul 23 19:57:05 2017 -- 1 IP address (1 host up) scanned in 63.41 seconds
Σ = 82 | Δt = 0.0031249523162842s