fail2ban bad ip database: ip 94.56.79.242

| ip database | live view | stats | report | help | api key:

ip: 94.56.79.242
hostname: 94.56.79.242
country: [AE] United Arab Emirates
first reported: 09.10.2018 22:15.09 GMT+0200
last reported: 14.02.2019 10:54.30 GMT+0200
time period: 127d 13h 39m 21s
total reports: 5
reported by: 2 host(s)
filter(s): ssh (3)
ssh (2)
tor exit node no
badips.com db
Lookup
  

port scan of '94.56.79.242':

[-hide]
# Nmap 6.40 scan initiated Tue Oct  9 22:16:02 2018 as: /usr/bin/nmap -sU -sS -O 94.56.79.242
Nmap scan report for 94.56.79.242
Host is up (0.13s latency).
Not shown: 1558 closed ports, 421 open|filtered ports
PORT     STATE    SERVICE
21/tcp   open     ftp
22/tcp   open     ssh
25/tcp   open     smtp
80/tcp   open     http
111/tcp  open     rpcbind
135/tcp  filtered msrpc
443/tcp  open     https
1099/tcp open     rmiregistry
1234/tcp open     hotline
1720/tcp filtered H.323/Q.931
1999/tcp open     tcp-id-port
2049/tcp open     nfs
3306/tcp open     mysql
5060/tcp filtered sip
5061/tcp filtered sip-tls
8087/tcp open     simplifymedia
8088/tcp open     radan-http
8090/tcp open     unknown
111/udp  open     rpcbind
2049/udp open     nfs
5353/udp open     zeroconf
Device type: general purpose|VoIP adapter|firewall|webcam|WAP|storage-misc|PBX
Running (JUST GUESSING): Linux 2.6.X|3.X|2.4.X (94%), Cisco embedded (89%), Check Point Linux 2.6.X (88%), Tandberg embedded (85%), Netgear RAIDiator 4.X (85%), Cisco Linux 2.6.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:cisco:unified_call_manager cpe:/o:linux:linux_kernel:2.6.18 cpe:/o:linux:linux_kernel:3 cpe:/h:tandberg:vcs cpe:/o:linux:linux_kernel:2.4 cpe:/o:netgear:raidiator:4 cpe:/o:cisco:linux_kernel:2.6
Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (94%), Linux 2.6.18 (91%), Cisco Unified Communications Manager VoIP adapter (89%), Linux 2.6.32 - 2.6.35 (89%), Linux 2.6.9 - 2.6.27 (89%), Linux 2.6.32 - 2.6.39 (89%), Check Point GAiA (Linux 2.6.18) (88%), Linux 3.2 - 3.6 (87%), Linux 3.5 (87%), Linux 2.6.32 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Oct  9 22:36:14 2018 -- 1 IP address (1 host up) scanned in 1212.42 seconds
Σ = 54 | Δt = 0.005385160446167s