fail2ban bad ip database: ip 88.84.200.139

| ip database | live view | stats | report | help | api key:

ip: 88.84.200.139
hostname: 88.84.200.139
country: [RU] Russian Federation
first reported: 29.08.2015 00:24.51 GMT+0200
last reported: 29.01.2019 12:25.23 GMT+0200
time period: 1249d 13h 32s
total reports: 10
reported by: 4 host(s)
filter(s): ssh (7)
ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '88.84.200.139':

[-hide]
# Nmap 6.40 scan initiated Sat Jan 12 13:00:07 2019 as: /usr/bin/nmap -sU -sS -O 88.84.200.139
Nmap scan report for 88.84.200.139
Host is up (0.047s latency).
Not shown: 1969 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
80/tcp   open          http
81/tcp   open          hosts2-ns
82/tcp   open          xfer
83/tcp   open          mit-ml-dev
88/tcp   filtered      kerberos-sec
99/tcp   open          metagram
139/tcp  open          netbios-ssn
445/tcp  open          microsoft-ds
554/tcp  filtered      rtsp
631/tcp  open          ipp
873/tcp  open          rsync
3390/tcp filtered      dsc
8009/tcp open          ajp13
8080/tcp open          http-proxy
8085/tcp filtered      unknown
8086/tcp filtered      d-s-n
8087/tcp filtered      simplifymedia
8088/tcp filtered      radan-http
8443/tcp open          https-alt
9000/tcp filtered      cslistener
9080/tcp open          glrpc
9081/tcp filtered      unknown
67/udp   open|filtered dhcps
123/udp  open          ntp
137/udp  filtered      netbios-ns
138/udp  open|filtered netbios-dgm
631/udp  open|filtered ipp
1900/udp open|filtered upnp
5353/udp open          zeroconf
9000/udp open|filtered cslistener
Aggressive OS guesses: Netgear DG834G WAP or Western Digital WD TV media player (96%), Linux 2.6.32 (95%), Linux 2.6.32 - 3.9 (95%), Linux 3.8 (93%), Linux 3.1 (93%), Linux 3.2 (93%), AXIS 210A or 211 Network Camera (Linux 2.6) (92%), Linux 2.6.26 - 2.6.35 (92%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.32 - 3.2 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Sat Jan 12 13:21:33 2019 -- 1 IP address (1 host up) scanned in 1289.05 seconds
Σ = 24 | Δt = 0.0038371086120605s