fail2ban bad ip database: ip 64.190.91.141

| ip database | live view | stats | report | help | api key:

ip: 64.190.91.141
hostname: 141.91.190.64.in-addr.arpa
country: [US] United States
first reported: 20.11.2018 19:36.31 GMT+0100
last reported: 24.11.2018 06:34.30 GMT+0100
time period: 3d 10h 57m 59s
total reports: 10
reported by: 3 host(s)
filter(s): sshd (6)
ssh (4)
tor exit node no
badips.com db
Lookup
  

port scan of '64.190.91.141':

[-hide]
# Nmap 6.40 scan initiated Tue Nov 20 19:37:03 2018 as: /usr/bin/nmap -sU -sS -O 64.190.91.141
Nmap scan report for 141.91.190.64.in-addr.arpa (64.190.91.141)
Host is up (0.080s latency).
Not shown: 1993 closed ports
PORT      STATE         SERVICE
22/tcp    open          ssh
80/tcp    open          http
2000/tcp  open          cisco-sccp
5060/tcp  open          sip
8000/tcp  open          http-alt
5060/udp  open|filtered sip
10000/udp open          ndmp
Device type: general purpose|broadband router|firewall
Running (JUST GUESSING): Linux 2.6.X|3.X|2.4.X (90%), IPCop Linux 2.6.X (88%), IPFire Linux 2.6.X (88%), Cymphonix embedded (85%), ZyXEL ZyNOS 2.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:ipcop:linux_kernel:2.6 cpe:/o:ipfire:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.4 cpe:/h:cymphonix:ex550 cpe:/o:zyxel:zynos:2
Aggressive OS guesses: Linux 2.6.32 (90%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (89%), Linux 2.6.18 - 2.6.22 (88%), IPCop 1.9.19 or IPFire firewall 2.9 (Linux 2.6.32) (88%), Linux 3.2.1 (88%), IPFire firewall 2.11 (Linux 2.6.32) (86%), Linux 3.2 - 3.6 (86%), Linux 3.4 (86%), Linux 2.6.39 (86%), OpenWrt Kamikaze 8.09.1 (Linux 2.4.35.4) (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Nov 20 19:54:14 2018 -- 1 IP address (1 host up) scanned in 1032.20 seconds
Σ = 7 | Δt = 0.0050790309906006s