fail2ban bad ip database: ip 74.92.210.138

| ip database | live view | stats | report | help | api key:

ip: 74.92.210.138
hostname: 74-92-210-138-Colorado.hfc.comcastbusiness.net
country: [US] United States
first reported: 28.09.2018 23:27.51 GMT+0100
last reported: 30.12.2018 07:10.07 GMT+0100
time period: 92d 08h 42m 16s
total reports: 10
reported by: 3 host(s)
filter(s): sshd (8)
ssh (2)
tor exit node no
badips.com db
Lookup
  

port scan of '74.92.210.138':

[-hide]
# Nmap 6.40 scan initiated Fri Sep 28 23:28:02 2018 as: /usr/bin/nmap -sU -sS -O 74.92.210.138
Nmap scan report for 74-92-210-138-Colorado.hfc.comcastbusiness.net (74.92.210.138)
Host is up (0.14s latency).
Not shown: 1963 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
80/tcp   open          http
135/tcp  filtered      msrpc
139/tcp  filtered      netbios-ssn
443/tcp  open          https
445/tcp  filtered      microsoft-ds
514/tcp  open          shell
843/tcp  open          unknown
1080/tcp filtered      socks
2000/tcp open          cisco-sccp
4444/tcp open          krb524
4445/tcp open          upnotifyp
5060/tcp open          sip
5222/tcp open          xmpp-client
5269/tcp open          xmpp-server
5555/tcp open          freeciv
7070/tcp open          realserver
7443/tcp open          oracleas-https
7777/tcp open          cbt
8000/tcp open          http-alt
8009/tcp open          ajp13
8080/tcp open          http-proxy
8443/tcp open          https-alt
9080/tcp open          glrpc
53/udp   open          domain
67/udp   open|filtered dhcps
69/udp   open|filtered tftp
123/udp  open          ntp
135/udp  open|filtered msrpc
136/udp  open|filtered profile
137/udp  open|filtered netbios-ns
138/udp  open|filtered netbios-dgm
139/udp  open|filtered netbios-ssn
445/udp  open|filtered microsoft-ds
514/udp  open|filtered syslog
1080/udp open|filtered socks
5060/udp open|filtered sip
Device type: general purpose|firewall|broadband router|WAP
Running (JUST GUESSING): Linux 2.6.X|3.X|2.4.X (91%), IPCop Linux 2.6.X (89%), IPFire Linux 2.6.X (89%), Check Point embedded (85%), Cymphonix embedded (85%), Endian Linux 2.6.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:ipcop:linux_kernel:2.6 cpe:/o:ipfire:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:cymphonix:ex550 cpe:/o:endian:linux_kernel:2.6
Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.18 - 2.6.22 (89%), IPCop 1.9.19 or IPFire firewall 2.9 (Linux 2.6.32) (89%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (89%), Linux 3.2.1 (88%), Linux 3.2 - 3.6 (87%), Linux 3.4 (87%), Linux 2.6.39 (87%), IPFire firewall 2.11 (Linux 2.6.32) (87%), Linux 3.5 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Fri Sep 28 23:52:04 2018 -- 1 IP address (1 host up) scanned in 1442.67 seconds
Σ = 26 | Δt = 0.009425163269043s