fail2ban bad ip database: ip 94.224.233.59

| ip database | live view | stats | report | help | api key:

ip: 94.224.233.59
hostname: 94-224-233-59.access.telenet.be
country: [BE] Belgium
first reported: 21.11.2018 16:33.30 GMT+0100
last reported: 10.12.2018 09:14.58 GMT+0100
time period: 18d 16h 41m 28s
total reports: 3
reported by: 2 host(s)
filter(s): sshd (2)
ssh (1)
tor exit node no
badips.com db
Lookup
  

port scan of '94.224.233.59':

[-hide]
# Nmap 6.40 scan initiated Wed Nov 21 16:34:01 2018 as: /usr/bin/nmap -sU -sS -O 94.224.233.59
Nmap scan report for 94-224-233-59.access.telenet.be (94.224.233.59)
Host is up (0.016s latency).
Not shown: 998 open|filtered ports, 997 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
80/tcp   open   http
8080/tcp closed http-proxy
22/udp   closed ssh
80/udp   closed http
Device type: general purpose|storage-misc|firewall|broadband router
Running (JUST GUESSING): Linux 2.6.X|3.X (95%), HP embedded (87%), IPFire Linux 2.6.X (86%)
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/h:hp:p2000_g3 cpe:/o:ipfire:linux:2.6.32
Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.26 - 2.6.35 (91%), Linux 3.0 - 3.9 (91%), Linux 3.8 (91%), Linux 3.2 - 3.6 (91%), Linux 3.0 (90%), Linux 2.6.23 - 2.6.38 (89%), Linux 2.6.32 - 2.6.39 (88%), Linux 2.6.32 - 3.9 (88%), Linux 2.6.32 - 3.0 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 10 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Wed Nov 21 16:34:45 2018 -- 1 IP address (1 host up) scanned in 44.00 seconds
Σ = 16 | Δt = 0.0050458908081055s