fail2ban bad ip database: ip 95.167.39.12

| ip database | live view | stats | report | help | api key:

ip: 95.167.39.12
hostname: 95.167.39.12
country: [RU] Russian Federation
first reported: 20.11.2018 17:39.41 GMT+0100
last reported: 12.12.2018 23:30.44 GMT+0100
time period: 22d 05h 51m 03s
total reports: 11
reported by: 2 host(s)
filter(s): sshd (8)
ssh (3)
tor exit node no
badips.com db
Lookup
  

port scan of '95.167.39.12':

[-hide]
# Nmap 6.40 scan initiated Tue Nov 20 17:40:02 2018 as: /usr/bin/nmap -sU -sS -O 95.167.39.12
Nmap scan report for 95.167.39.12
Host is up (0.059s latency).
Not shown: 1997 closed ports
PORT   STATE         SERVICE
22/tcp open          ssh
80/tcp open          http
69/udp open|filtered tftp
Device type: general purpose|WAP|firewall|terminal|webcam|printer
Running (JUST GUESSING): Linux 2.6.X|2.4.X|3.X (96%), IPFire Linux 2.6.X (90%), IGEL Linux 2.6.X (88%), Tandberg embedded (86%), Kyocera embedded (86%)
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4 cpe:/o:ipfire:linux:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:igel:linux_kernel:2.6 cpe:/h:tandberg:vcs cpe:/h:kyocera:cs-2560
Aggressive OS guesses: Linux 2.6.32 (96%), DD-WRT v24-sp1 (Linux 2.4) (91%), IPFire firewall 2.11 (Linux 2.6.32) (90%), Linux 3.2 - 3.6 (89%), Linux 2.6.9 - 2.6.18 (89%), IGEL UD3 thin client (Linux 2.6) (88%), Linux 2.6.35 (88%), Linux 2.6.18 - 2.6.22 (88%), Linux 2.6.32 - 2.6.39 (88%), Linux 3.1.9 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Nov 20 17:56:51 2018 -- 1 IP address (1 host up) scanned in 1009.90 seconds
Σ = 7 | Δt = 0.0054230690002441s