fail2ban bad ip database: ip 178.140.255.103

| ip database | live view | stats | report | help | api key:

ip: 178.140.255.103
hostname: broadband-178-140-255-103.ip.moscow.rt.ru
country: [RU] Russian Federation
first reported: 22.10.2018 23:54.27 GMT+0200
last reported: 14.07.2019 06:38.56 GMT+0200
time period: 264d 06h 44m 29s
total reports: 6
reported by: 3 host(s)
filter(s): ssh (6)
tor exit node no
badips.com db
Lookup
  

port scan of '178.140.255.103':

[-hide]
# Nmap 6.40 scan initiated Mon Oct 22 23:55:02 2018 as: /usr/bin/nmap -sU -sS -O 178.140.255.103
Nmap scan report for broadband-178-140-255-103.ip.moscow.rt.ru (178.140.255.103)
Host is up (0.13s latency).
Not shown: 1975 closed ports
PORT     STATE         SERVICE
23/tcp   filtered      telnet
25/tcp   filtered      smtp
53/tcp   open          domain
135/tcp  filtered      msrpc
139/tcp  filtered      netbios-ssn
161/tcp  filtered      snmp
445/tcp  filtered      microsoft-ds
2000/tcp open          cisco-sccp
3000/tcp filtered      ppp
5555/tcp filtered      freeciv
8001/tcp filtered      vcom-tunnel
8099/tcp filtered      unknown
8291/tcp open          unknown
53/udp   open          domain
67/udp   open|filtered dhcps
68/udp   open|filtered dhcpc
69/udp   open|filtered tftp
135/udp  open|filtered msrpc
136/udp  open|filtered profile
137/udp  open|filtered netbios-ns
138/udp  open|filtered netbios-dgm
139/udp  open|filtered netbios-ssn
161/udp  open|filtered snmp
1900/udp open|filtered upnp
8001/udp open|filtered vcom-tunnel
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.9
Network Distance: 13 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Oct 23 00:04:40 2018 -- 1 IP address (1 host up) scanned in 578.22 seconds
Σ = 83 | Δt = 0.0044291019439697s